Analysis
-
max time kernel
20s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
08/03/2023, 07:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://doc-08-24-vault.googleusercontent.com/dl/jjjnlkha2gpagns97vsbcdq7dqkiqiqb/ejaprif7ait54ssorosbjteh40ulg2t6/1678261500000/17231536799562198565/05025612398146234958/DIz3PdRJh7pXLTyYDiBjsQ==?m=0bc68932-fadd-4ad1-985c-62f611952401&authuser=0&dat=ACD7onqG2MDoMQNX81bTq7-GGaJUy0eswJ1n65DWugzAtvgJdV6OQ4_wO9-EIv09zzThB1d5EMeTc0kOtp2JlEFoUe88qFqtX-xWFDvn7DOH0blHNPP99Mc2BOIM0x_u3fi-YS56rai90DEzlKLSWak-u0HVIQMbTTmwdGoLnK0ROj9-1RJDBZjoCyOR7mD2u5Q0u-zGPsWsQigVpN22IGpYWa4eTM5CWmPKAqqY4s1D3_6-Bmc_FgS88LCElgurtaK4CtJfHOxyzIfry87mU1AsgC0qd55WJa_2Qg6GYbYmPhDUgp8MTwVBI9clpFRUKK0C40abmkQmRNq43R5DXQeEI_RWgwI8_RhZf9r8WMd7G-edltTk-eadyPMHia5pUUrOmrUD-Js-MOOPUv-t39aTgjbvyKsEFS1btj3d8bBGVeijRVACpzf8-7rbBzMYrmTVsZkaCUB35GhmLIeGCwrDiFT1T3dQSOHlNGMS267EakCxt5Eb7CCt8Efy0lfYTM9thVGx_f7XA_g8I0lUkRozvo7ikxioGkZJvCt9z1IP1GdAHQAkhhN7nBv-5l6RZf1Cb3cjTT0gU8WnjGlbDZkjDB9d3oVoc5pZaWnOQVMhu-SSbeFsHdKxcTIzZrEhLM4hBFSX9bU3-Z7K0_LG6klWCNluv1ulXH9cgcnaFy-0LHvPO-l-qQy1VP218VIy-P1zH-xiCAslAuE6h9UFO9xswg6HffUFuWa4HzNrCIzCZHh8yHMZDfUy3pvh1ko-aroI9cxEwejPgyopHsV8gc_utEAqpf23CfFh23HLRFdyciXga_JS5KBfTho_0RMtXdzCvYwFf9l-QLdX6BqYtS-KxNlL029Fm8wBKmliG_BZxgKpHKX6S5m4R4S9JF4ncVScplDG9OioAZO_v4WtCK0C0avKPxJhCJLRSUNUEGGcHFKOIhzbKcNBQKxf-A4XrzS09DXkUZdB4WZu2rZuhgy8g3ho_ud_zPEKNbQO1NaPeoMY9fWaXFG_EoDrdpqdcdLyx8id02L1BZNIf3_NI3kjzLLAE7YEeCA3itIov9qZ74FPnRNmZyIxVTmWjyyfTr3356h8-iel8rZY33xKtBZMz3XpqJ8odz7x7_hZnEpPZVYO89RThz9_qkZ3H7zldFPw6ignveXf-OCqbuukinDEZd4WBXK4-z4VA6b4XKvOkkLx1-mR1S_Y61kXSCbADRIuMRt89a4b4usJRQG5ywKx77awiGT6gRrbeDTJAPVn4jMbFkGaz4lgVsvE4IALnNDp8qXGGU52YTyj3A4VCZ4lxH3-Xk-i_zqRbNxtR11-zdLvDyePeGctmafv3xSu7sNdppL69fS-&fid=ACD7onrlhFATOz6Imrtp2_ETqqaq_RxBEgO2AUDUGXC4TDSPDYytNiYsc3V5FQbidcJKLcmRbNYeWt7ek9Rux5yZfdsPGhc-r7bffjvfv5EKhsDE11A1qMuL_LvscbD6Zd_eVP4we9O0nsOIYH_7d80GZ8hCgPrY8g&idt=archive
Resource
win10v2004-20230220-es
General
-
Target
https://doc-08-24-vault.googleusercontent.com/dl/jjjnlkha2gpagns97vsbcdq7dqkiqiqb/ejaprif7ait54ssorosbjteh40ulg2t6/1678261500000/17231536799562198565/05025612398146234958/DIz3PdRJh7pXLTyYDiBjsQ==?m=0bc68932-fadd-4ad1-985c-62f611952401&authuser=0&dat=ACD7onqG2MDoMQNX81bTq7-GGaJUy0eswJ1n65DWugzAtvgJdV6OQ4_wO9-EIv09zzThB1d5EMeTc0kOtp2JlEFoUe88qFqtX-xWFDvn7DOH0blHNPP99Mc2BOIM0x_u3fi-YS56rai90DEzlKLSWak-u0HVIQMbTTmwdGoLnK0ROj9-1RJDBZjoCyOR7mD2u5Q0u-zGPsWsQigVpN22IGpYWa4eTM5CWmPKAqqY4s1D3_6-Bmc_FgS88LCElgurtaK4CtJfHOxyzIfry87mU1AsgC0qd55WJa_2Qg6GYbYmPhDUgp8MTwVBI9clpFRUKK0C40abmkQmRNq43R5DXQeEI_RWgwI8_RhZf9r8WMd7G-edltTk-eadyPMHia5pUUrOmrUD-Js-MOOPUv-t39aTgjbvyKsEFS1btj3d8bBGVeijRVACpzf8-7rbBzMYrmTVsZkaCUB35GhmLIeGCwrDiFT1T3dQSOHlNGMS267EakCxt5Eb7CCt8Efy0lfYTM9thVGx_f7XA_g8I0lUkRozvo7ikxioGkZJvCt9z1IP1GdAHQAkhhN7nBv-5l6RZf1Cb3cjTT0gU8WnjGlbDZkjDB9d3oVoc5pZaWnOQVMhu-SSbeFsHdKxcTIzZrEhLM4hBFSX9bU3-Z7K0_LG6klWCNluv1ulXH9cgcnaFy-0LHvPO-l-qQy1VP218VIy-P1zH-xiCAslAuE6h9UFO9xswg6HffUFuWa4HzNrCIzCZHh8yHMZDfUy3pvh1ko-aroI9cxEwejPgyopHsV8gc_utEAqpf23CfFh23HLRFdyciXga_JS5KBfTho_0RMtXdzCvYwFf9l-QLdX6BqYtS-KxNlL029Fm8wBKmliG_BZxgKpHKX6S5m4R4S9JF4ncVScplDG9OioAZO_v4WtCK0C0avKPxJhCJLRSUNUEGGcHFKOIhzbKcNBQKxf-A4XrzS09DXkUZdB4WZu2rZuhgy8g3ho_ud_zPEKNbQO1NaPeoMY9fWaXFG_EoDrdpqdcdLyx8id02L1BZNIf3_NI3kjzLLAE7YEeCA3itIov9qZ74FPnRNmZyIxVTmWjyyfTr3356h8-iel8rZY33xKtBZMz3XpqJ8odz7x7_hZnEpPZVYO89RThz9_qkZ3H7zldFPw6ignveXf-OCqbuukinDEZd4WBXK4-z4VA6b4XKvOkkLx1-mR1S_Y61kXSCbADRIuMRt89a4b4usJRQG5ywKx77awiGT6gRrbeDTJAPVn4jMbFkGaz4lgVsvE4IALnNDp8qXGGU52YTyj3A4VCZ4lxH3-Xk-i_zqRbNxtR11-zdLvDyePeGctmafv3xSu7sNdppL69fS-&fid=ACD7onrlhFATOz6Imrtp2_ETqqaq_RxBEgO2AUDUGXC4TDSPDYytNiYsc3V5FQbidcJKLcmRbNYeWt7ek9Rux5yZfdsPGhc-r7bffjvfv5EKhsDE11A1qMuL_LvscbD6Zd_eVP4we9O0nsOIYH_7d80GZ8hCgPrY8g&idt=archive
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133227392541141200" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2275444769-3691835758-4097679484-1000\{1319B35A-70B8-4AB3-8F6A-BD1130EC2D83} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 1432 5100 chrome.exe 85 PID 5100 wrote to memory of 1432 5100 chrome.exe 85 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 2112 5100 chrome.exe 86 PID 5100 wrote to memory of 1480 5100 chrome.exe 87 PID 5100 wrote to memory of 1480 5100 chrome.exe 87 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88 PID 5100 wrote to memory of 960 5100 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://doc-08-24-vault.googleusercontent.com/dl/jjjnlkha2gpagns97vsbcdq7dqkiqiqb/ejaprif7ait54ssorosbjteh40ulg2t6/1678261500000/17231536799562198565/05025612398146234958/DIz3PdRJh7pXLTyYDiBjsQ==?m=0bc68932-fadd-4ad1-985c-62f611952401&authuser=0&dat=ACD7onqG2MDoMQNX81bTq7-GGaJUy0eswJ1n65DWugzAtvgJdV6OQ4_wO9-EIv09zzThB1d5EMeTc0kOtp2JlEFoUe88qFqtX-xWFDvn7DOH0blHNPP99Mc2BOIM0x_u3fi-YS56rai90DEzlKLSWak-u0HVIQMbTTmwdGoLnK0ROj9-1RJDBZjoCyOR7mD2u5Q0u-zGPsWsQigVpN22IGpYWa4eTM5CWmPKAqqY4s1D3_6-Bmc_FgS88LCElgurtaK4CtJfHOxyzIfry87mU1AsgC0qd55WJa_2Qg6GYbYmPhDUgp8MTwVBI9clpFRUKK0C40abmkQmRNq43R5DXQeEI_RWgwI8_RhZf9r8WMd7G-edltTk-eadyPMHia5pUUrOmrUD-Js-MOOPUv-t39aTgjbvyKsEFS1btj3d8bBGVeijRVACpzf8-7rbBzMYrmTVsZkaCUB35GhmLIeGCwrDiFT1T3dQSOHlNGMS267EakCxt5Eb7CCt8Efy0lfYTM9thVGx_f7XA_g8I0lUkRozvo7ikxioGkZJvCt9z1IP1GdAHQAkhhN7nBv-5l6RZf1Cb3cjTT0gU8WnjGlbDZkjDB9d3oVoc5pZaWnOQVMhu-SSbeFsHdKxcTIzZrEhLM4hBFSX9bU3-Z7K0_LG6klWCNluv1ulXH9cgcnaFy-0LHvPO-l-qQy1VP218VIy-P1zH-xiCAslAuE6h9UFO9xswg6HffUFuWa4HzNrCIzCZHh8yHMZDfUy3pvh1ko-aroI9cxEwejPgyopHsV8gc_utEAqpf23CfFh23HLRFdyciXga_JS5KBfTho_0RMtXdzCvYwFf9l-QLdX6BqYtS-KxNlL029Fm8wBKmliG_BZxgKpHKX6S5m4R4S9JF4ncVScplDG9OioAZO_v4WtCK0C0avKPxJhCJLRSUNUEGGcHFKOIhzbKcNBQKxf-A4XrzS09DXkUZdB4WZu2rZuhgy8g3ho_ud_zPEKNbQO1NaPeoMY9fWaXFG_EoDrdpqdcdLyx8id02L1BZNIf3_NI3kjzLLAE7YEeCA3itIov9qZ74FPnRNmZyIxVTmWjyyfTr3356h8-iel8rZY33xKtBZMz3XpqJ8odz7x7_hZnEpPZVYO89RThz9_qkZ3H7zldFPw6ignveXf-OCqbuukinDEZd4WBXK4-z4VA6b4XKvOkkLx1-mR1S_Y61kXSCbADRIuMRt89a4b4usJRQG5ywKx77awiGT6gRrbeDTJAPVn4jMbFkGaz4lgVsvE4IALnNDp8qXGGU52YTyj3A4VCZ4lxH3-Xk-i_zqRbNxtR11-zdLvDyePeGctmafv3xSu7sNdppL69fS-&fid=ACD7onrlhFATOz6Imrtp2_ETqqaq_RxBEgO2AUDUGXC4TDSPDYytNiYsc3V5FQbidcJKLcmRbNYeWt7ek9Rux5yZfdsPGhc-r7bffjvfv5EKhsDE11A1qMuL_LvscbD6Zd_eVP4we9O0nsOIYH_7d80GZ8hCgPrY8g&idt=archive1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d3549758,0x7ff9d3549768,0x7ff9d35497782⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:22⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:82⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3224 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:12⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:12⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4552 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:12⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3476 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:12⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4772 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:82⤵
- Modifies registry class
PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5116 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:82⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 --field-trial-handle=1780,i,9549649676851739658,5547030636710285073,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD588de26fff9ce29c577e3fa3946c7cf3b
SHA1f6f92980a0ee8a92c461e8f656d532d8a00ea7bc
SHA2567c70b6492c543461338e572efc9e0489fd439c3043c16a5f3ff34dd167cf30c8
SHA5120aa57411a52c7498fc7e189e36671e3e22e427cca9bdcabd81c57bd9a9aa7f18bccbd1ca7c35c2ab333ba7b81673cf9b0a73a94a8b53f5f13983c0e48e084253
-
Filesize
6KB
MD520558d79f3bfa7fe02222e31445db007
SHA19516418e0b92abe5802f0eb680006f77857316b0
SHA25689e668f2d7ba095fb0002e0674ce1c9d0165bb64c1b5db446fdec0dda5f111e8
SHA5123c065aadcdf62056317018124019f497a3aecf81026229362241c00389c7ff394aae0debdd3c4ccec34832b559deb6636960033f4f40d5bf280e35d754246415
-
Filesize
15KB
MD597517e164936612bee38cf617e51238b
SHA1c7878962a81099324b3f070e315c164cdd7de0c9
SHA25633b80b28b31cdd16ad8a8218f0a88bff54d4747481907174ff32cdd1fb7b5fec
SHA512bcb94cb6c5e5c56017f95b75011b32dae79898680f99c05b7ffdcc18ac8827e52908a2024a35c2beca844ec72d32ec279aea1d261e2fa05aa5d1e8d7a2109764
-
Filesize
143KB
MD5f613324fa8cead459727ce23d2586348
SHA142be6fd4fe0125ba6fdb139e8d4f29f9840d5a3e
SHA256b8d61fda582d2bd90b17807c10cf2decd01d8d5232e9084d4751761c766cbedb
SHA5126d9ab3779a1bef6b854aeb43fe7d6a757ff77ac3ebb3ae39e96524a5615569ecd5f96f9a7a9158be787b9be9d84ba010eb3f478d5ecfa6f53c60aa45725dfff6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd