Overview
overview
10Static
static
10Srenshare ...in.lnk
windows7-x64
3Srenshare ...in.lnk
windows10-2004-x64
3Srenshare ...es.lnk
windows7-x64
3Srenshare ...es.lnk
windows10-2004-x64
3Srenshare ...ns.lnk
windows7-x64
3Srenshare ...ns.lnk
windows10-2004-x64
7Srenshare ...os.lnk
windows7-x64
3Srenshare ...os.lnk
windows10-2004-x64
7Srenshare ...ch.lnk
windows7-x64
3Srenshare ...ch.lnk
windows10-2004-x64
3Srenshare ...mp.lnk
windows7-x64
3Srenshare ...mp.lnk
windows10-2004-x64
3Srenshare ...SS.exe
windows7-x64
3Srenshare ...SS.exe
windows10-2004-x64
3Srenshare ...up.exe
windows7-x64
7Srenshare ...up.exe
windows10-2004-x64
7Srenshare ...s-.url
windows7-x64
1Srenshare ...s-.url
windows10-2004-x64
1Srenshare ...1).exe
windows7-x64
7Srenshare ...1).exe
windows10-2004-x64
7Srenshare ...ew.exe
windows7-x64
6Srenshare ...ew.exe
windows10-2004-x64
6Srenshare ...in.exe
windows7-x64
5Srenshare ...in.exe
windows10-2004-x64
7Srenshare ... 2.lnk
windows7-x64
3Srenshare ... 2.lnk
windows10-2004-x64
3Srenshare ...er.exe
windows7-x64
9Srenshare ...er.exe
windows10-2004-x64
9Srenshare ...ew.exe
windows7-x64
6Srenshare ...ew.exe
windows10-2004-x64
6Srenshare ...ew.exe
windows7-x64
9Srenshare ...ew.exe
windows10-2004-x64
9Analysis
-
max time kernel
87s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-02-2023 01:36
Behavioral task
behavioral1
Sample
Srenshare tool/Atajos/$Recycle.Bin.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Srenshare tool/Atajos/$Recycle.Bin.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Srenshare tool/Atajos/Elementos recientes.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Srenshare tool/Atajos/Elementos recientes.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Srenshare tool/Atajos/Folder Options.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Srenshare tool/Atajos/Folder Options.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Srenshare tool/Atajos/Iconos.lnk
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
Srenshare tool/Atajos/Iconos.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Srenshare tool/Atajos/Prefetch.lnk
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
Srenshare tool/Atajos/Prefetch.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
Srenshare tool/Atajos/Temp.lnk
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Srenshare tool/Atajos/Temp.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
Srenshare tool/LandSS.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
Srenshare tool/LandSS.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Srenshare tool/Tools/Everything-1.4.1.935.x86-Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Srenshare tool/Tools/Everything-1.4.1.935.x86-Setup.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
Srenshare tool/Tools/Jitter Click Training-How fast can you click in 10 seconds-.url
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Srenshare tool/Tools/Jitter Click Training-How fast can you click in 10 seconds-.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
Srenshare tool/Tools/Kangaroo (1).exe
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
Srenshare tool/Tools/Kangaroo (1).exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
Srenshare tool/Tools/LastActivityView.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
Srenshare tool/Tools/LastActivityView.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Srenshare tool/Tools/Paladin.exe
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
Srenshare tool/Tools/Paladin.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
Srenshare tool/Tools/Process Hacker 2.lnk
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Srenshare tool/Tools/Process Hacker 2.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
Srenshare tool/Tools/RegScanner.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
Srenshare tool/Tools/RegScanner.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
Srenshare tool/Tools/USBDeview.exe
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
Srenshare tool/Tools/USBDeview.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral31
Sample
Srenshare tool/Tools/UserAssistView.exe
Resource
win7-20221111-en
Behavioral task
behavioral32
Sample
Srenshare tool/Tools/UserAssistView.exe
Resource
win10v2004-20220812-en
General
-
Target
Srenshare tool/Atajos/$Recycle.Bin.lnk
-
Size
804B
-
MD5
99ab386bb4fcf8da3ab110b46276a71b
-
SHA1
3012ec50a2e4f1d4ae4663e3aa9f6292cc775d0b
-
SHA256
0358484c8ed4908dd795d86df608c3e603749a7c2c06ce85c6ca814913a47487
-
SHA512
1add8e04d1bb4ff2fc1c51005fdc871dda7eaf02c2c221ff1ee51ea0c67f0684e6c6e59fa17bc7312f783a0b875e461ddcd066d1c759b47af7b7c0866516fc64
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 21 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU cmd.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 6600310000000000474bf69316002452656379636c652e42696e00004a0009000400efbe5e470d3b374e37a32e00000039000000000002000000000000000000000000000000a129dd002400520065006300790063006c0065002e00420069006e0000001c000000 cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff cmd.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags cmd.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff cmd.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" cmd.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff cmd.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 cmd.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 cmd.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots cmd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
chrome.exechrome.exepid process 888 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
Processes:
SndVol.exechrome.exepid process 780 SndVol.exe 780 SndVol.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of SendNotifyMessage 36 IoCs
Processes:
SndVol.exechrome.exepid process 780 SndVol.exe 780 SndVol.exe 780 SndVol.exe 780 SndVol.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1924 wrote to memory of 1740 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1740 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1740 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1896 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 888 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 888 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 888 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 1592 1924 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Srenshare tool\Atajos\$Recycle.Bin.lnk"1⤵
- Modifies registry class
PID:1616
-
C:\Windows\system32\SndVol.exeSndVol.exe -f 38469831 8971⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:780
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5f24f50,0x7fef5f24f60,0x7fef5f24f702⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1064 /prefetch:22⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1764 /prefetch:82⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2076 /prefetch:12⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3260 /prefetch:22⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3612 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,1617151046753568938,4078328679522763839,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3704 /prefetch:82⤵PID:2088
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e