Analysis
-
max time kernel
494s -
max time network
496s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
22/05/2023, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
yamamoto.jpg
Resource
win10v2004-20230220-es
General
-
Target
yamamoto.jpg
-
Size
24KB
-
MD5
301f569d2b0edfa97b35b3043002bc8b
-
SHA1
5704d9d7bcd1c5be753a1891632b2ccab553a4db
-
SHA256
a90ec21e630db2f8f75ea43b808509461e36af9d4874160e26f7f8625fd36901
-
SHA512
c77c10d82d9040b868df89aed08c70c466aaea87cf8071ccacd64f7bb4bd5b9a5211a8f3f2288255602a0bd50cf0c81a21f5d8b74ce1b41d1dcbc0274ee07cda
-
SSDEEP
768:J8VG9My+Ro7F59FHYx6Wuvc+yfrAySwHteSEOG:2sMjshxYR0ParPSi5K
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133292556946119737" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 800 chrome.exe 800 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4792 4644 chrome.exe 93 PID 4644 wrote to memory of 4792 4644 chrome.exe 93 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 2372 4644 chrome.exe 94 PID 4644 wrote to memory of 1476 4644 chrome.exe 95 PID 4644 wrote to memory of 1476 4644 chrome.exe 95 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96 PID 4644 wrote to memory of 5004 4644 chrome.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\yamamoto.jpg1⤵PID:4728
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d17e9758,0x7ff9d17e9768,0x7ff9d17e97782⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:22⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3328 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4576 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4692 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4856 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4868 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5140 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4840 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5316 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5476 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5688 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5316 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4580 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3480 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4912 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5012 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5580 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5840 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=5980 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3484 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2796 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3484 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=3256 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=5948 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=5916 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=6040 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=5764 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=3336 --field-trial-handle=1888,i,17897262121366242238,16550309182987512267,131072 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2004
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x50c1⤵PID:4896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5373cc2e3ec9d99d952aaba51c020430f
SHA10ee8956bf110589e5d5c24bf2b3a78cb40f34dc2
SHA2567a9f31d5ad402987a7f9ce091e8fd90430232eaa7882d98b782a86ff65837a88
SHA5122b3d5ab1b65b5704bd4849693ae11249a98548379f705209542dc1f70788c495a1115969485207211ed8e3ec1af8a410c209e255ce9618852a2877fe77dcf4a6
-
Filesize
34KB
MD554c5bfb8a890d87139d9abfe01662c83
SHA1f9eddf5b8a3269e6d6fa40b4f13083705e6267c6
SHA2569685e5cabe4efc8c85e986725af8009b306416aad3ecc9086ca5bb12b84ce4ef
SHA5125c0cd726211cc74bfdb7aac7967f51b1af183bd509f17d9d9ae4fcc4f8cb51c4253091b8cf2fce600552cb48411aa075321c7333d9aae617784cfdf71f90adf7
-
Filesize
27KB
MD560d45f2f03c47bf1d9134efea60e90f1
SHA1c8d2e400d0fa92895dd98a76e7c1902d20f6a616
SHA2569b88d12c6b7c6c2b2c43dfa13fda3506412a3e73b17d7ebdd684ccbcce325f24
SHA512d4f3a472593826d02afa3156db6c4e1f548f276438f5f58b293b2813154e6f11a3ced1e9d1892732bbc8d33f28aea254263028604f7eae07534bb9800b9ce460
-
Filesize
19KB
MD59d20cfafa7191ce3322e7623b68c5ba7
SHA1e6112bec89ac6bd7b699e37615a6ca2ad590278e
SHA25622014098e6d33c9f3c8143c9de9ccc03d33e634ff64920d01aee8935103b7eaa
SHA51284214e7f5d2a2b70186db97055779fc6dd25fb3db6abaa611df1765038d3d27a92d17c104fdfe98928514c6f6b6b481867ab6eec4ebd295a44c2bbf34347bb58
-
Filesize
58KB
MD5bff9aba3bdefe77175a7151d7c3fa120
SHA1d2cbd7bfc2f728778ecb6c478cb16ad26709a973
SHA2567a38cd90a2e06a96c15119f08e30fbf7d1e4102d1089f2035a2909ebb5fc0ecf
SHA512f3f968d72a2a8c9f6b376a81ad45853271342ca077475586c54cf591995523c74cfc828e25adbf6037a5ba95bd854cce9d6c86e80c9eb49393e611355873cba7
-
Filesize
99KB
MD58d2b73bb8b9b340dd1c88fc6b7822da4
SHA1c6da103f205b4db9359f5bf16166d240838f4ea4
SHA256a513319690f0ee3e96f8d9dacca9dcbdd1d7a34e890da1692d74e0522a8da5ee
SHA5125dc7fe93f3689b9c84e4df4c21ce839452baf993c3d144eadf8bd0b75e265f258cd4ebf053a3cf86b1349c5048ba7d68eff85c27bb84e8815a241c74ab1f3648
-
Filesize
24KB
MD54f8a8d65bedf045a133c47c1ff896856
SHA138a31920741f2f82f7960ab50840dd1c6fe303dd
SHA256df96825d182e1ed775b306deae3f28ac241dec0fff1a02a73abdde586696375c
SHA512c674a81412a8e6c00d3ee299f0cf52e0e5106f899dd7e70f287355fa044fb8097bdbe97cc8cb4aa1b1260080c19d7e69076a564427ddd8dd7b9703a802dff0cb
-
Filesize
26KB
MD5bc3df91d3c32bdb9a27d98b59dd469b4
SHA1247199823137ce197dd761e8bbac0840b5b552ca
SHA256502dc1f289a666aaf0374a09a860ed1f5acef85a7f711a022316a10486eb28ab
SHA512b5b1abed13aad9f3129d5e8c1b68542db88aa56f77cee78166b527add2b313241e44e524d3f929bc7a9cb2dc9947528d02ff7f32412a25f522bc83375c25f09b
-
Filesize
61KB
MD5201ee149fc91e7d6b937f9f8f989f93a
SHA16453cb619b01cda82b638d21b17884b171cf6b08
SHA256095b5338ffbe85482c55e3dcf69e8bc5d9131909a445be2abb6a3d8ead4dfb71
SHA512adbd1536adea3864174f8bc1ad4c5d364fb9c773e59842cbce60434bfc21089f18de89aaed7905f12a97593d224fa324228f8ba21ec029b78edcd5968a9dc6c1
-
Filesize
40KB
MD585b4b8c829f6353162bb8d4a34b1f6bf
SHA112522464e768fcc5d854d1f34a813f432f191a0d
SHA2569505a7c0f2ef71a4542074ab216f332b37f61655e0f19add7d57b757d7be83b5
SHA512dddd5a64f0fbff7649a4babe76327dfabac33c8bc0bb7c7485d6c15c350b48ec059c71edee4d0162ca108435bbf34972df2e96b1acef8bc3037247749a23655b
-
Filesize
16KB
MD527b4d1491dd2017a668f9f545228a560
SHA1e7fd5a0d6659b6c68b02f1511a158ecfd1d3a081
SHA25682d5d3a89e5dd46636a639897b49336d401badbdf36d3a8ccdfa3d2fdc76cb45
SHA51268e1951538b404df7221c309ab6eb0349ba3c0f03dfa44d181e1b3710e4f5d95adc748086fa3274f82bbb4fb168e6614303594550b6a638851be5415d6e1e9af
-
Filesize
40KB
MD5fdd0a7a58b37d9f155cc7fa6b00200e0
SHA11b3253a11da97aea90eed315a7169d23e8b373d8
SHA256e8823739e5e8b0492c9e444cbe0ed35489984efca1143a9f9ab23552a2dd45ca
SHA5128cc794b459865fcb651743499580bce8a546402f340f42f52b651df100e5519e66035378fb534c03fa314165627dbb1a43a8b92132e33282b2c570c4b66bbf38
-
Filesize
1KB
MD529da50cf732d384afe1523c736005dd0
SHA13e59ff022b62ea88bab57e6c19f18eb56c9ca697
SHA256bf0aef82346b7c2d52207f258ca1183ca21c76b9bab6babd459fc0f69ceba964
SHA512b9eac1d9fa17bfe23169b28c1767004c73479b415e935bb84f5cf396b8a21aa68ba5af00018820183fafe605bde94bd34dfa0399a27e5aed7355fa81207f9089
-
Filesize
2KB
MD550e72de1394a6430c51f213ebf63a6ac
SHA1dcd25ce6e0d18d8b9893a7e884af1da5e70146cc
SHA256626abd6e299323f10c6a1936734bee41b20b9e5e7f0c4cd8a4b5c5fea4c124cb
SHA512ee1f949c57581d366534716506ee88e13e73eddbf58df8e46e66ad6d9204368f48569c5901eea965510622a916d9595fc294066cd8314f448561a7764618d956
-
Filesize
4KB
MD5260df1f70fb5ae3fb4afd2a1e0fbb722
SHA1a2b53c82e779b17eb29cf0e98644c116df7bb839
SHA256b0adc10327dcbabe067b7a37aea801e45db7c4bcd1b09221d87790d188a73303
SHA512e9f6d4fdbc0228ddde3135195a04294b3778aa1b6bce41f5725f8ba223303ccba22adef34bf204c871044d9cebee540c8b69b5856a9ece6175cb3329d056ebba
-
Filesize
4KB
MD57ae634bd853e7b6b449b53789015f50d
SHA1ef7920be78c2177d02620c70921776806881e8ab
SHA256de4fb59e8acb97d2b70cbe4b7245802eb9863f4aa9ecad0fe260429d92232f31
SHA512d2a6af624fbb81e388cc09ae30e8b8e14a431e47dea76fece2b7202557df2bf7aed205733bed588c5395324c212387ae700cbb44cd8d9480606aaf2c811d5b67
-
Filesize
4KB
MD5b934fca23dbcc7cc3ea86d0919d63d04
SHA149f6388f9e7e96654e1507b18cf4d01ea76299c1
SHA2566aa36a2d70794b78ab3ade680daf13d93897935cbc0448dfff40d01fab100293
SHA51216197050df6d8139adeea3af529b715c03832a670527e02c086fd41d399e6849d6dfef22b8a7fee640d61acfb5365badc3ead9c2eb9a846a1e7b86e3a2cdfbbc
-
Filesize
3KB
MD56150270fb32992b8a64de5d2e94daace
SHA1a3a079936c2187bcbae151d5a5a80c95caf5f7a7
SHA256b70958241f868694bd9337090bafd76e1de3c71858d581d3d1d15238bf77363b
SHA5123ee1ade5c936e43040f0486907be6d535b59cfb34d3b69959c1e943591685bbcd33fdb8410e914f8078002d27596c2157bf695a45d197a0c7aaa43fa384ccf11
-
Filesize
4KB
MD5802f1b19e2b156933543311ebf4f1896
SHA148017b764ad8799c0bf2c26dd99f0483f85014e8
SHA256ab6f9f087e2ba0a9fc2cbf6e25c1bd956cdb25837befd9e7d43de184dae8f642
SHA512a756331b8581a614e3ccf9e959736a742efdb07b0dbf5946c068f253cb7eefb30a62dbe2993e6aecb3221ead4334981915092efba54207e354be3995beb1e88e
-
Filesize
6KB
MD5120a08bd56a5e37d5b5527e3816cee59
SHA18b8abb1623a4a49182b3e4ea16fbce7d58daafc7
SHA2569b3151617f2420c4a6313f1fc9e0552c4b1d28e3e5e1f1c69f416d4052271bef
SHA512772e53e25326616db3e40d3b36b622457f06a507d2991524b539b3f3243b50f16bafd8809b783ed128b18f68f2140f213acef0d76fa525e60001f7f45eae5dd4
-
Filesize
1KB
MD521f60367764ce4071984a6efd8ecaa66
SHA1f288be3c90dc01967d48cf7cd81c75a5daddb5e3
SHA256b3dcd35215121c0f1279197405204817c95a5476f6bf742700604f138cac2946
SHA512b2174fa27a3680f538c27bf4ff98c4de4213c16e0f6090acb7dfa8a33c62eafdd0d362cd588168273a9030adf3689eb730bd40b2943ae2e0f21c4a3586e7d50e
-
Filesize
539B
MD5ab6adfc8fc73ec50bc2934cc3bf136d0
SHA10ee11b4c28a8b47b0468d190cb7347b1cdc33d99
SHA256fe9b3f9cc0dbf2e2be49a8a84b05e98f50e849f850cffe5e3c76d8a5a91e4a4c
SHA512f9ed0a9cf84dbb0f88ea0881c4521fa64478b07410bdd781c91ed2d9f5cb63759ab3bf36393a4b7fb974e8220878ade136567c2b080bdfc9f2960b0d96062cc0
-
Filesize
1KB
MD544381f9653ca00ef169cfaaf4ec046df
SHA17572b163203f4918e6ddb5c41b089602f24a06f9
SHA25609a636a23bf58828ac776a052888a79eb0d0606f3274bd6ff3b417fbd9ae219e
SHA5127fa1711e08544f4c849e6f03c22f10a8daf6b94be0c14d7da3faca63bc0ba09fe79ea2b701e87e0f6218b2eef6a9dc71662d918a1ff29fb53faaa5c659699d08
-
Filesize
1KB
MD567a6dba37c5ae641df89363daca61157
SHA14281c9539f6ee9cb407c14dbc99af5209301a479
SHA2561091709917babab55e7dacd4cd6e897c0466b537dced6a793b58331790a1f867
SHA512d735fa3f7ff3d74f8d69b58a2710533f0281400645eb42713bd168bfa800f15e672e18f869270e998f6262e9f41d8bbf4eac81030ad069b3e5b7684acb7f57a7
-
Filesize
1KB
MD527a24eff7edc81ba8e7d639e7a8737da
SHA195029b9ea3540f1cb740a45febd241bf91fe889d
SHA256b3e87c4d8fd196b4e37419ed10e64d7e2a097014449e77937d21452f56907349
SHA512138589e1188b08cd6b2e1df391ce452ec4b6ada13987284fc7534fd9958cf09f9b4bc3b69ccb9b06db249b5ab7452df4f9ed9acf2af383df54e5635f00c5cf69
-
Filesize
1KB
MD5a1d5e0d9dc5705a99867be6ae0ceead9
SHA12f14e4028fa16da6cfea3650e2aec9f034e14557
SHA2564e435a6e2cdddf0e9d20d26134cf06869379685c176a04996cb8f108460a6807
SHA512801dfab847f0e3ffdc69c1480861e53c336a7b2163fafe014dc76a6589802954384f996baa579953e8a70ebd5a009066626186ff0ee2be7748d8891f859789bd
-
Filesize
6KB
MD5e657c01b3d1dd756e9b99b36eb02293e
SHA1dec19af901c447e960f770516c4c06a005cdcbd2
SHA256dcbd33a32a6a5de0a5534270810093ac3b0f97289dbdf7f26ead5f02a9ab8ca3
SHA512bd705f88fe7ebf556a85fbaacd85bdb6228ac904cb9b8959eda855e3f513621b8775d0eb76029f841ece755b588c0814ccb0c55d2f4f5d83910f9a29e65068e0
-
Filesize
6KB
MD5f2bf7dc2ea72a27493beff53ae549656
SHA1566c12d8365efa6e4918fd5d1311c7e54faa6fac
SHA256f3865302494d2785c89d1ec1cb0e3046d4cd477a716db620f85ee75be9c9a081
SHA512cf5652239c28880a91594c86db2f589455ed7093911b963badb276fced3a835f79f502b561d8be71aba8165bbc049844b69890a4253690200015d488b983c32e
-
Filesize
6KB
MD593d362bb24539aa955c3ca3c36111c1b
SHA1414e7c79290fa76a5cfbc2121cbbb1559040f73a
SHA256d981585e7b709dcc572788c599deb1533cc5c89a02c8b82ff947f4e13d4ec83d
SHA512e3b73a7475708fed0acb1214fefffb7ffec9dc86bc340db9ee35ec7f27a936511cd46f3fe243a575abf4d06082574b21778c2a135f5f7c98eb47aabf098e5591
-
Filesize
15KB
MD5146419a143daefa810728c43d331167b
SHA13f2afde5e31f6e34e147340f96f5e8adf0ffe296
SHA2562e095d173e3e79eea06b5c085a60e6f54f1c5795e2406507e6623f4f64946b9f
SHA512dfe468c0d1adbc95d5aaa4589060d1ab0b41e9a8d8838a23ac21aef483053b7637ad7c61bfa2a2f96a84ee3c3c5361a9fa50b6adb6e5835bb070591686fdc154
-
Filesize
151KB
MD5ddc290ccb5fee06d1f65f6a6e60a0a6a
SHA1ac37821a6569a412330dcfa7526250816b406763
SHA2561882da3c8f0df77813e2e7b2e79bf1d349372503b4dcc8450b7b99348acab12d
SHA512395850a98bd557d4d8fc0d7bc1fd9d072f3ef73169e59afa1c0431467f1f6c16ec0e4f9f0e5d8efc108e65194011b2285324306951dfe530616af390963cde83
-
Filesize
151KB
MD56867d4fe17b2e621a7cf975d05e5d469
SHA1471e89ad284d6e6065befa95022f73646c99f990
SHA256ac3a85a142c1f296ff8280ac0c798323d59b227b7b7b5c67dacf0915d8d83134
SHA5122951decdba79d8d9ce93d8005cb1b691263c6aa775d168cc8d6e8220ab3e3c0620dc1cb22fc80d959176457f4ce932330d0e5c26427c0c2f82ee78441930bc0f
-
Filesize
99KB
MD5d209687a0c94362416be27953e8bf7c9
SHA1ab90a838f3304036b54210bc2f004a6ec56de7c8
SHA2568a6b849f42db4e1c6950a864e72d7c3d8c482cdac4afedeb710fad67ebb07e7e
SHA512bad3dedab96faa56676cefcc260c9e2ab50ff8bf79385f1bb416ba7ed590939b11fe9eac3f02723443378760505e8805ac5dce905481f435ee928516a24be54a
-
Filesize
102KB
MD570d0de57e2c87719e646670ef135475a
SHA117fc1c0c123e4948acdf9f59f167c6fa5d33f965
SHA256fa2ca9c7c7aa2e4bceed973c07d3819274c7ceb2b8775469d19ee8cf51848491
SHA51245c9c9733c498300234ef87b85b0aef9ecfa34271473c58a24fe8674cbe8fed4ca9027fdc3f667d1d56bc2eb9b9c778982a137b117d77ccba77c12a52ee72569
-
Filesize
99KB
MD50abf0432ad3676b4b5e7cf71fe7dcd07
SHA117d2f7240f277858a1ee532124efd913d77241da
SHA256b76097797f8aaa3096510f4fddc28d0e1b632e8780cc9bdb6fbaca875868b37b
SHA51278581fd0434168a3fab212fcb9640aa551a01e829a4b774f0a1d5f1347b4a6e56b82d4a40a26d9ba2f86601e976b2379a3bd98c0a027c50af0bf7b9062e315db
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd