Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 14:31
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://adam.flarefmstereo.co.za/adam/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
http://adam.flarefmstereo.co.za/adam/[email protected]
Malware Config
Signatures
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{DAE67D64-C98F-11ED-ABF7-6E9A6C474791} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8088a6b29c5dd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31022492" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000675316f82fdac74aa8f3bd7995064a97000000000200000000001066000000010000200000005e109ac1a13e89034166a59dce069a7bef0c2b362a247cb8b193e18fff204c57000000000e8000000002000020000000d1c0c1ea5402c688b24af63697c76f3241eb05ea310fa1a01edfaadc0d1b787f20000000bc56e7902adf667f678b3d33ef4cbc9ccc0863266bb88e4813a35ad2c9d7bf30400000005f92398f17b0490843a4b955cf6561eb24b3f57d428fa0c9977fe781b11ad13d1f287e4b10b5154b74191e92ba2fe151077774197e491a85b9c313706190853f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2949149869" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31022492" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2949149869" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04e93b29c5dd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000675316f82fdac74aa8f3bd7995064a9700000000020000000000106600000001000020000000957dbb485714cc490d11079640c3ce11b2f68b5d3e12d9791028bdf945d54b2a000000000e8000000002000020000000aa812c6470c9ae255caaa4d80b603e8eecca7ec5007fcbf5e5612e412624c88020000000e9669b522bd5b2bd938ce1111a71234ad29efb16b38f21dd3f20b156b8846ccc40000000c2dfd803c7d6b3e60af13ac8e143de3d45940905ffa5642db75730cbfaac0e0141eb4f5b520d74cc696aa192390fabb98b4aa6ffe554c0633d83c93460304105 iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240591475965616" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2604 chrome.exe 2604 chrome.exe 2116 chrome.exe 2116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
chrome.exepid process 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe Token: SeShutdownPrivilege 2604 chrome.exe Token: SeCreatePagefilePrivilege 2604 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
iexplore.exechrome.exepid process 5060 iexplore.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe 2604 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 5060 iexplore.exe 5060 iexplore.exe 3612 IEXPLORE.EXE 3612 IEXPLORE.EXE 3612 IEXPLORE.EXE 3612 IEXPLORE.EXE 5060 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exechrome.exedescription pid process target process PID 5060 wrote to memory of 3612 5060 iexplore.exe IEXPLORE.EXE PID 5060 wrote to memory of 3612 5060 iexplore.exe IEXPLORE.EXE PID 5060 wrote to memory of 3612 5060 iexplore.exe IEXPLORE.EXE PID 2604 wrote to memory of 2240 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 2240 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 376 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 1476 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 1476 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe PID 2604 wrote to memory of 3768 2604 chrome.exe chrome.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://adam.flarefmstereo.co.za/adam/[email protected]1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5060 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b36d9758,0x7ff9b36d9768,0x7ff9b36d97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3204 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4548 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4704 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4848 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4984 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4536 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3196 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5232 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5328 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3336 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5632 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3448 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=1292 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1168 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 --field-trial-handle=1816,i,2298069521596714910,8941322984232944699,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD54ef0545b0722ab940c38b114936328c9
SHA14b56a35bab1b327559fba70302568635894d8d2c
SHA25600fe5b52b826fa95eaf1a07a88a87b7d93b96377c833ea4883cd881fc94c7577
SHA5123d20fd1da5465490296183f1ebdd1ed268feb811206b63faab31ea66b32245ed9884feae3c68cdd51d97ac84a50ec9e712094285f3209c6d46d7a8546e96a88d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
840B
MD5ae532c1edd12466c2323457ab8ba9fae
SHA1969c20d75179214e90eedf7605a8dfbb8c84f834
SHA256753eda388ceaf74aefef881650112b99e11b8a5adf9b93e471a08f627d5b5d4f
SHA512840167dccf67373acf6ce7a7f5480e66909d71146a051679bc2b187de8b1078710f1eee4ffb9f1f37e983125b1ef777001693199fc548d2f55bfbe6c9331fae9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD51f8ed2efd2ac6a14c0e6cce47a76a2f5
SHA10ee9fd86236760d7b4fdbac9ede13eff0f458b3b
SHA2566f3d3338afa0cb4e3a51a24624b52cf3f2a4819ab1fc71847858926009ef372c
SHA512270e234dd9f158a731c2674db5e3b90cd677a67883caf1c4b93a66b51467caedd9ba5a0be4207fd0e88d55e2641d1caebfb08fbc484c5070ec94c0a3b376eb6b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD5205971a8d00e8bb279d5efde2b19d086
SHA1f074aadf294f6efed27896b1852c2da85cc96a7d
SHA256144fc6e87e710247369e9cbd555e7eaef8f469a72c1d6809ccc24ad867b94560
SHA5124599d6349e639b8569809e0be4694bff45278e563c991bb8b262b392775b2b3191b4f1c36f0620f4b0fbce28b32274fe0cd466b8a8e1367e45c537174388f6f7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD567db274dfa3a6de4a19be5c74ddc596d
SHA11b03cd1043fd2ad68638a24376e62d466b2c7647
SHA256a630de5bc4e75e739f99cc6059510f23c41c90017cd0eba43eb4b5f2863f7e5d
SHA512e186fffc89419957804486ecc86ec35666c7f81a9db3f3a26c330953cee8179e96d023c715f1b9b681cfa1db9cd3f638d9de14fcabdd203f00220a6d5251a711
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
371B
MD57cb19e557e281be1dfe4cb0f94ffad44
SHA120eb14b0e6fc0c8cc2c6e54d299ea89fa7fc4d1b
SHA256f9572f7c3529e68ab2b62f46cecf6da5183faac76f77f10eaf9689dea008027f
SHA512efa02b32575cbd8058d19e8f5a86492caecb27c001b81954dc531d2b3138574c41ec1f970c1ab932ee7d2b9609a9a740d869fd0abe7aa2c6f9a8fad685af6b3a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD57a896b096e0e102bf1787e2a43b9a76f
SHA19118436d204608d9cc894b41bc8150cf33557dac
SHA256b1292247bdd6c5e1bd38181130dc5341a133df6056db86b1621e061199c2b913
SHA51286cc0d36837d41475b02f09cda057a0c3015b8a07b9ad0738da72725e7bfe33b1b80a0d21a9ae1b588d5b03ec39263dfc8ee5f8bca1bc2a3c42eb1322ea169fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD536a9ca8f5d7a3282670da7d4dcc96dd8
SHA1b15c8d6b7fe9e2a48445668f330f3ecafc5bf941
SHA256d0e9851af38b3e31502c093c317de7bad7e122a3bcb3373e2dab8756ae6acb22
SHA512570e948415e617304e6939964aa118dd60417f0e7bdc22f063925b7a5c9ee80e516e25b6a91a6311377f9a3f0cddd0afdb49a690519e9db2a58897a101eec080
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5921e0ed391455da854937b709bbca8d1
SHA1b8e2a6185be979237fbb97cf2dccf99a8f436a38
SHA256e3b4118dfd28a78de075d76147e4edad9903d43a4ac77bf251454cc11b646c7f
SHA51296ab9941e3fa069217e73eb5ab1d7355d0856a6804f98d52b8f1b70dc29876ac74794bd3ee1d3eae081ee2130e30ecba3dd48492535f5e72502342738e320fbe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD500fbd905f981600a1241302ea875b1df
SHA19a00f57afa5473940bcf6cb860bdc2f0a28ead55
SHA2562ecab530a7ea4bad70e8759a6951739d690f28ad27aa7c64ad3eadbe93955ce3
SHA5127dc945fa6be40c845f28427f6da0b0649ff69eafbe443575e4f7b4f3600eaa7a4b68a69eba72fb8a98906971db10b229541b99026d55fd624d86f348082c38bc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
873B
MD58d3ee95c17bf1a44c5176aa94cbffcf1
SHA1dde4c443a36d45e030e73d6ca5beef35bc5898d3
SHA2561ddad348714d3a2ab074d2b40ccf74fbb3e9d0f289175c9663d5d3b25a3b3ddd
SHA5124d248be4a08dd966f5528f2842f4a5dd06c4d6a12172172e5373b48c966f21ba4f79c35e8e108238e5036358b8c0ef7d41bff118514f37fb651b9380a9bd3114
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5f2ae4a675a3e43bb1400d140c97fa814
SHA11e8c49d3f6bbb4546edc114e16e8e7e4b196dfc7
SHA256a0645d30024839a74c36bcd5cd9d0cb51030527da5d65836ddcfe88b2bb982ce
SHA512f31b2e1974d4b03e5588f4349ef2f6b72fbf1030a8cdd28a81628a7d8a07598d7103d65644f9373bbe8e7b1f6680c1f50b98db68b4c9523919d99092a9d1a66e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD58ddb17e2e777614bd4ba7158c6031bf6
SHA12c48adab6e9988d32e5e1171a12c26ffb5387679
SHA256a828370c98f7f00ef9da4c0a60f96469d1ff47eac66b7e591475e898880c850e
SHA512012dc4a150ef3e986a7bc6150f68c7900672e8061f990ac8f81823ad8a7d660a21c25ca9abee94f59997a8cf338d419b3e50d51f0d33472b31aeb1e6eab97d6f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5f6214c7d45edee9ea95a77b0551b4cdf
SHA1ab58ff42e2f078ce62ce92656454c04997490528
SHA256e4e8e725f9d071e9fbf648ca62e917016fe85d23e339af93d3a1637105c3066a
SHA5121b1ff1c9360ab28aefb9bb9c349587aade1a7b8cda03295fb07b9f7668f26e7916858fac6e3f44265af1abb53319b4da75b2768c38e35ef2a2043ea2f9a5155a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD59b948a742b20cd5f477faafdb2a50cc6
SHA1bf9db43c7b2c18803a4cca992be3365ce52aade5
SHA256c1603a65321783187f1fddfecda976d90a5cac215f38df522a403546e645e534
SHA512c05710206f20964cc8c25f24ec08e1b6ff867b31decc17aa7ee7b2310382fa112a13b085c944494063d13d330b643cf05263f5a0fa16d81ebd88c3d628965971
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5ca03d1892eb2fc7aafb147ae01ee389d
SHA1596e500dc42213938eb3768351d31d3837669bef
SHA2562ba3f1b717903fd9669688cc7a9ce392bda68bbda86c6b362a2591f690a1984a
SHA51201f9cf78e66171e3b37297afa6f81c4b74ee8bb5fe62d63aec597494913f9c306f2da1bb47f64afe7e614113dd8e91d33081759a1f4509ced03429a41951b320
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD532f9afe463ecb4cba7428863b6022b94
SHA1356d2c40885b66bb65c8f065afa5aa09b09d7a51
SHA2568e0b9536ea09d7ceae9fb08487e0ccde35634aaa5de40dec592fff6a7cc513ae
SHA512029ee58e91c2247025f3213538cd4fd019d0b009ee452db085677fa001beef13cbdff7401d5467ec999a1a7164710d939fc5bf766b62c60b095ad0e420640825
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD577505a0c2a49dde183ef6ddbbe1edb33
SHA18c96fb9b10c2beb268707ffb26790f8107ba9e91
SHA2566f7a5a41985bc320898b5a084223754282696076585de79781e8c36164c24865
SHA51232af3ddc0c8643b498e9fc587965b1fef3af6a742616c59466cc6db9800e0d2260aaaa0e7369ecc426d4840c093ad461f5e22eb4f6dadd0913e207e008f2fad3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
145KB
MD5fb2bb343371104d50022833ae18f6b60
SHA15665702b85a751def0711b1ea297ad07ffbd33da
SHA256b993d5466defa5d1d9577b21eee145c94e75079651115498bedb97f17096c2aa
SHA512cf5519a1800dad958ad6ce51fab5c194451283a7cf31f2456551e392fa4e5527933df864b99738761f2a3a6bb13963af797d136a92b82a4cd0327884125abb88
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
145KB
MD512ff394e04cce0b4f21f1a4b5937c3aa
SHA16e852759476229a31cbfe860b10d79166e4d757d
SHA25603b81c92e7ad5fe23ae36844dc5498644b259167d1611eb59b5ae84e814e7ece
SHA512037a988cd5e7d55dfe780e1d0e662925f9a0324b18e564cf31892a86a4d3226b02c5109de0658e3aa29ad3059e767dc02116987957562a2df123770fa36b79c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
101KB
MD5c939f044a2a414d0dd9482463c1deb28
SHA1d8615087d0030df2b4c5f631e20ea21fb0ffa657
SHA256889406a9bdcf2943a519abfd6e0b8f779b6a602760151c15e8451129cd499331
SHA512d667ba3eca770155aff59b36ede84c13c7d9d20adbc1e8219af81e962f01b8c56c236af8de85e64d90d351ad414cd83d364cdce030ac7891d79a2e12af784581
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5853e7.TMPFilesize
100KB
MD5a93af15d555eb95b7f8ed6150e0ebccb
SHA12369feda3b0d1151e28200f5208825d33f475ed9
SHA25607b01a0701fc5e8d6ae19e739db685ec3f5766602f650637d14ae973fa6d4a85
SHA5125b330887b51dbbd5d1d72781c6438ff51bb2b3f9626ca5e807e2839694db12c689ac4662f6bb3668d1dba1ba0cda126fd876d70ef031f24a066ed378493610de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Temp\~DFC203B90953EB1375.TMPFilesize
16KB
MD56931ba9e89997b7434fc812fbcd88c82
SHA12cd3f1f533030d6a9afc40815ac15105b4842bae
SHA256525237b9ad0c58f005f99021c816b1f18baab8db2de621c5dfbca654ffe7ef18
SHA512975a081b78a8227d3cd9e85ed3826155ee6008e2d4352ec7a466c27eef749bc77a5d388094d5b22c5be5c8c40140f1e5b64262d33260ec9349cd911d464511d1
-
\??\pipe\crashpad_2604_XWSGFRQRKBQYERBFMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e