Analysis
-
max time kernel
1531s -
max time network
1566s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 13:46
Static task
static1
Behavioral task
behavioral1
Sample
1RsaFv.png
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1RsaFv.png
Resource
win10v2004-20230220-en
General
-
Target
1RsaFv.png
-
Size
1.7MB
-
MD5
b4ed79fe7234d94f2cdddcc5aac79cb4
-
SHA1
dab8af5932dc67a200dc445ece0f297aed17706f
-
SHA256
10acf2393d7d78ff700b8af4b64acfdc763817abb112b0f771b3ff3b13505718
-
SHA512
7feea6041f1712a1db8c6f1ae3ee8e88dd0a8a8a52cb06b687daffa3657697aebd0e633032b49ab43791a40449683dbec7fa84acb6c653f0e854b74adef13557
-
SSDEEP
49152:UsqTm+ZyUPvtY2T+cWIjvyvr4xa2Z6emC4GhDuGBEsQEFTQTi:UfTmbUPvKdc/j6vr4xaQ6epDuGBE1EF/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133313108603111637" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2488 chrome.exe 2488 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1596 2488 chrome.exe 98 PID 2488 wrote to memory of 1596 2488 chrome.exe 98 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 3236 2488 chrome.exe 100 PID 2488 wrote to memory of 4796 2488 chrome.exe 101 PID 2488 wrote to memory of 4796 2488 chrome.exe 101 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102 PID 2488 wrote to memory of 4988 2488 chrome.exe 102
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1RsaFv.png1⤵PID:1400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc1d5c9758,0x7ffc1d5c9768,0x7ffc1d5c97782⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:22⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3296 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4456 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4628 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4776 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4712 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1060 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1648 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3304 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3180 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5348 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3180 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4648 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5520 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5680 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5820 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4508 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3220 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=5972 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=6112 --field-trial-handle=1804,i,4816876261749983018,3668352721524884523,131072 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4668
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f4 0x4e41⤵PID:3444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD55b0c0d429185ff30e04c93f67116d98f
SHA18eb3286fe16a5bee5a0164b131bc534fd131f250
SHA256f1a0b957050b529afc0e94c436976326124ed8968183859c413986487623294d
SHA5126295bcd662325172b15c476d26f23c8794c4f1454e0e8cfd43bca79b45aa03e1ae721ebdada1c52fe7699027fa97699156280ff259ce3cc476e322ccc0337902
-
Filesize
20KB
MD5923a543cc619ea568f91b723d9fb1ef0
SHA16f4ade25559645c741d7327c6e16521e43d7e1f9
SHA256bf7344209edb1be5a2886c425cf6334a102d76cbea1471fd50171e2ee92877cd
SHA512a4153751761cd67465374828b0514d7773b8c4ed37779d1ecfd4f19be4faa171585c8ee0b4db59b556399d5d2b9809ba87e04d4715e9d090e1f488d02219d555
-
Filesize
312KB
MD53beec8fa8477a41c028d4f5e6ebb5202
SHA10cbf62ab4d20330930b3621f2c62c24e84e54026
SHA256ab7fad481f3208c4bd307fed33a2d6ea06495192c9fd651b77fc9df4a57b996e
SHA5123cce1b95855e883fe0c1c6c31852bbad9a50be6683c440e5010828941246ff03db3ed3f74b7d22d8e97523363ed52628481988d667216ca4aa6b5471fe86487f
-
Filesize
79KB
MD5139540953e8f38618c8ab93335204289
SHA16e243b8a4b9ac1d7f9184998691edf4dac904e4a
SHA256e352eea95b106038e9f6df7f9a5f87499d28d4270fe8c77ed58a0067c4e60dc1
SHA5121bd802b3179b8930009bb40c81ab6d21559dfc2a9036123ebab1e935a8f252094cfc57bb1aec320001f6e906cc0d63fa7f1ab9de7dbf1a71cdbcf12196648b79
-
Filesize
65KB
MD59008db35d545875768f51c498810db68
SHA1324c4fbd184dd92a77e61b9e1397c8d6bf41444e
SHA2566ffe03abdacb762bc1070ff69528fea107d33b9d13042501192eaf0c693f97c5
SHA512c5d3179df0b8ee2af6374832c57279b555fb27c4ef6ec00860a74eb79b240d8b3e1e36e0e0551186de157e4d99037f4546e63958c2852b5d043137826ce44876
-
Filesize
212KB
MD59bf38a0d3d16b6c6f2b2f863e42b15ec
SHA1a807eef00bfa98ee39c4125f391a712e05257870
SHA256fb810e66da4e0e5ce77c403466e029660f7ded8f8615c6275b11ccb4be353473
SHA512ba91fc00f2e907cf15c0f525fb2600c263aa1cfda603359ba52b855250e0c3d2be62405939803602db15be55fea7793b5792d6350ddc1d44fd4b837724a03c99
-
Filesize
316KB
MD5a70b4b9f08ad1b4f902621c7bd53dc5f
SHA108752e14c160990ccc4d7d3cd894adb3806b9a63
SHA25685c48d363a51770d5d60b2d79dbb3e402077608674c1993126e131fe871a17f3
SHA512079fadd497cd90a81c2054adf23449761ed8f0c1886cc70b0e6389a9551883ed4d75743c8b5a044dc4ebe473b32aa687a7f58c5cdd21c238bd4b6b4d927f4c6d
-
Filesize
95KB
MD51fd35897e32d6e8cb096c4cf5384b3ca
SHA16cbdde74a11384bca826ad24ccdddd7373cbef2e
SHA256a636123bbf3603202764f1654c63dee7ff8401e1d8497b3ec5bac35fcba82d9a
SHA5123412d39306ac1cc09e96fd75717902b3dd3e827b5e1791dd33cac8407cbfd4354cd9cb47081c379fd8af235eb4106bf1cdeadbf595efb957defb35a741616164
-
Filesize
406B
MD579f92a9ecd4205c5e8a8a3d3492df3a9
SHA1af76997258e7b213d8f63940e8766ca4e3c53acc
SHA256097a1fbcad3a11644dd7c1e335dcaeb5948579f910a7bfd30d0f419842ff9806
SHA51263b26c08af0f0e5d7e5a4e783fa6ff3034d813040e090fa1eb7c61eca4d55382bba2d37de84017b437270f2789af62031ed26e22eb9826c6c6442fb0c2c73228
-
Filesize
184KB
MD5edafdd4a610fab9f67618f62bca64fe6
SHA110869eaf7ab43b6c3e9f8019db7257744378ab4d
SHA256d6d73fb2f969f4db2b9e8ee2bb7db5964457f04cb530f426f64772cd397b284f
SHA5123ba94becc9865f46b5372ced095b31472f5837614a4cffb3a27ba461332a090cb3fb7240dba8d6d1fbc3af8758527a398ee3ed69eb457be823f5d3adf9c0a59c
-
Filesize
2KB
MD53f0fd7894de8030e113993d70ca0d53e
SHA1fb3fc74803fd4dd56f8fd532507aaa1003847601
SHA25621d114ef0ac62369f3a7b394beedce57bede26099936564e1d3add319ede0d2e
SHA512b3fb27123a7fc2c261365beb3291da8c92450bd6e364ddc35c9ab5d9b08a3a7fce3475b47cdf88dbbea4c9855b68d8097a84c0fb657a3295a45f12dc66fcd83c
-
Filesize
144B
MD5e738bec6fc2030d52aaf9a408acec3e2
SHA19927e1b9f7ec640a34e790d191c2b2d6aa6711f2
SHA2568f8f247a0b96454a7646309926a9ea674e5b826242e8c29ea120fa66eee76d90
SHA512659a7d098c6909bd5d5279a7b6244afe55a9fb256831fc474a8154b233f1077cd95aa243a1b2b4e2189587b197841ac5eea59adf4d041fd0122b181668b7c58e
-
Filesize
264KB
MD52a70eb85cc4b4e2a10aebd67037a2852
SHA1bc7f10dab170e101bd5d73e60abea3f143e9c398
SHA25691fba6ece56735cc97ee355b8711767b10c4cdfc12db1386658c9ec961059a0c
SHA5128ec9b9583a3c566c8c4595dbca7178b844490ac82fc6a3bcd688a6fc3c9e15d4d7f6be41db03f5f34affa416f97ce42f841ab1c08eeb2c1d600498461fdca429
-
Filesize
1KB
MD5b4355dc6ea5e1afab7dfeb4fc23b09b4
SHA1a8e30facaa8d079ba2f2b236309953fb15bff78f
SHA2566f4863005341fa4e30b2d4bc6abaf89bbd0c6cef840439730eb9fd763aaef022
SHA512886c8cee40944f4186ae722a3dc0c059c771c5376f426593f5e80935961bb6771a45598850b1b1807413d3fa61f95dd490b1b7da7dd422e94311ae33871446cc
-
Filesize
2KB
MD504d7ac95a6abfe5604d9087523f29afd
SHA1d4d71ef870089baf0675d4a8eafaab044715a0de
SHA256b767c9753f589f2606591eaf84913ecce849c98e99740175e9b5351b17620ce3
SHA512ae63c00c02daf1904e05cc82410b0839a1b950e4f5dc962cb045a6be22e06d929a69351389e3fab9e5aa19b30fb205aa5067d484b4aad6befef0bff7be858998
-
Filesize
1KB
MD513652abb25faa4cd9c403ef4ae9b45dd
SHA1615df07dcf5197232b3bd3bee8d853fd2f400945
SHA256755b090b9d03360060109b113e528a6feb05da444f70181cd8ea500b9961d2fb
SHA5128bfbfe79f4f62c3e664496ce893e7fdeb739d0d2f2dac488fe8178f947d4727c58d65ed0f75e592a61ef6fbf9422ceec099598fbf7e61594332035a383305a18
-
Filesize
5KB
MD525183dea237f21bca399f99832a4369b
SHA13fc3985304157ea3817ed67d60d5af4feb6a59fe
SHA2566107db080b1c84c15b5b5d2283e99c38911f7539751fe3292b037d9586825222
SHA5125ddf33865c90136bdb3e85c2b3171b774c9b471c7c4f14d2811251155ba9259a8a4b59f79ce0a9d61419ed636d816c67a0d15c1a285dcb0f7945e4bfb1d41385
-
Filesize
9KB
MD58190f7438e27430faece4eaa6569fba2
SHA11b5a82fab75b2f038c02476ccc755d2a149a028b
SHA256da480ccbf800ad5175c18beb181bb0b0f699922968450c83426b87f15dadb829
SHA512d6f822c0f5ecba7e30efcba0301857696120d8d28633343de47cea2f6048acd1cb8a31698395d59708a553ad4afe9e2eadc7e7c07b0eab7eac64e26a69c5e0e5
-
Filesize
1KB
MD565f91fe7210770b11a266a316171fe74
SHA19e5db424286d4a7fadac4ac6e8c0d21e7823f5d7
SHA2563e33508b7de250ce48b18d0e3d0cbd5187478e64c552a5058739681ce67dd17a
SHA5121e259a2bfaeb974873617b9a70e6b10062feff665ac41bfb3c0cdfe3289df2fbe5e346814de7c57a9c1ddf6db860a120ed06464caab625c1d72ebc0d4ff31612
-
Filesize
539B
MD53e5c33d5edba58e9c6b9b7fdd9e5ddb1
SHA12429706acb58e099cb1b6148215b65127ee4d65d
SHA256f027c2cde7f227e72f7a0320ee928b81851bb87650b26cd0139c65fd0b8d8ea7
SHA512092740ad2417d10a2c8c8f0f55ac32fbfcbd7101083363454fe2df147c3404167307e00d5dd7aaac203ce7aa3b2e7c54ab1da774fa8452e42929eaa9ee8b6d38
-
Filesize
706B
MD5bbee2ee022a8bcd5761809677ed7a9e8
SHA1f98aa5c6e7dfb8461156232768e038f09eccb1e7
SHA256c3805c8d5528583c04fa07ba17a21f05e8b46752f42c5887a3ac65380410e4e6
SHA512806d4e40d28672d9dbcf5022955aa7b089f3a88d5fef8f3438dafbedc86ecfa97bf63eb9fe946c8b92c0ff820d13f62375920f2f7a2dc8823022e839a1a1d55c
-
Filesize
4KB
MD5a870c4787f34c5a46e97f4703ec8c7df
SHA1fa11ff09ba8bf8062ed84e5627873f0e309f629e
SHA25649be3d3c19dd84872a1f437ac261ee702b48b457fdfe8ee86ec493ef2f6adef2
SHA5122b134b99209f9d581363c612c5ec42e5e930216fb437fce0d9bc51f14f1cd6efb5bfc5fef153a4da00c55303447863f859b3977e01ef626a8d7d6c6024389ec0
-
Filesize
1KB
MD50afe20f0625721294203b2cd9f0e4a5f
SHA103d186125a0482da9682647d1b697216d95a78f5
SHA2567d825a8072d5f38cfe2c90fc466e528c37da449b8c7c4e7035f5628cf756d480
SHA5123b7b935938edad69e3aaff1021d91e6d34cad8b6dacd3f4260d5a8388f6b873df10e7208012bf9672f2add9369179948dfd78ced4a5338c7efcf19ed08112803
-
Filesize
4KB
MD58576f34d5829b9b4a23bdcd46de9e54d
SHA125445398fc4c1762599a5f3dc5b9ae05876a7ff3
SHA256881505368024186b331174589a78718679550158a746c396501018ef428f802b
SHA5127059407b74fb1b9a0a60be5eae8b3eea17e299d55516f11a519b19381eab4c13faeec87fd6a57139a97276c18959c418cffcdf1e96513571354edc7fc121f796
-
Filesize
1KB
MD5d73d3a2f4f2e71269bdfe086e6c5becb
SHA1ca86a99b7cdfce86516584f0d4d2a75dbdd911cc
SHA2567119630ad16d078f1ff624b46277748934fff4c6e1a14012b8ff523bf0a28e87
SHA51289c55637a27fb36bb96218cc0032831e6c9131f22c64900a0920a3d3485d25df927d6b11a5757ee2836192f1d6edeacae4210ace24edc5333d4a183c34fa97da
-
Filesize
6KB
MD52c4830322f98f0c5e7f5246c46be55f8
SHA11cb16bd525220de83bc1b0da73329807f50e73e1
SHA2564093f68ef20ca776b788fda62e973a1e99a36f9ade32470713efa06a097510ff
SHA5121f1a5b538112f22a597163a4ea97b78d71435cb2f8ad053adbbe8b06259a0e942b467d0127609a69f657d3bcc90199245c066d7d3c65f6354950eb7fb54fc286
-
Filesize
7KB
MD58016a8ef301b29637fe5484367de1bfe
SHA12784f4fe287f1f816974dd0094d5e7d39f6c9a48
SHA2568f9bc0770e97cb41b469f28c9819512904b8fd63b61d22fdb00e9c09d0aa3a39
SHA51283c66054da0e00969491c20afdaca7d1a8e67884032259c4de63cfea679a5f48cc4c53dd1676244311cfd18561d3ba881140379be80e0b0306b2426b6cdd020c
-
Filesize
5KB
MD5d45a11141d063d3f7513c161d38bdcf3
SHA1590ede4a3d1fe8956cde36a6df92cee9dec3fe88
SHA25670a863121c8174ca92e902736b46cc0d6a81ac090de1a2e2f6a199f82b3758aa
SHA5124d1465ac33456ba7c7bbbcbc38023a1c72c17bda0c92cfbc3d480fbb9bc29e8e4523475d25488da9f715d325cba2b35244a60f0b9aac9840765bbbc9800059af
-
Filesize
6KB
MD524277495b98ff659f6d980011bbe05c6
SHA1a0912ec5cf00795ceaa6d276ec8e22fac66e0877
SHA2560b4b8609b146fcf9a967377c2ceb7711eede0ba2886116749c55b01b3e77ccb1
SHA51207066d441927724088ff8ea6f109def8d3a378766ab6edd48a65df91e61482101a5db95fcd86d84190693cb8653631537bcb282f9bc2dedd31d6d05207be6f8a
-
Filesize
5KB
MD555bd38b41a411e890e10ebba8f001adf
SHA11d95eaa9d0fb4c13ae4fd18d5ff9a9fc1ddc3eb9
SHA2560e3afef5417b29cde3a8db6989d5b18f491fcb5f0d4b3c13a27c339ab50ba619
SHA512ecd275e452a84d13bbd8fdd5abcaa9d9d16dcae7667a671aa07841af2725821b8a8235e273aca9badea3acf5f16a780f287acb403521437f6807f2f421971898
-
Filesize
5KB
MD597977fdfdad8c889621e4ac003e51a30
SHA12ef0624bdcb0e3699ca2a18d67322efe98f8bc3e
SHA256b2aaefc8439396cb0b9f8b727fcd33437a2633d56e7dc76adcf4c661a6056cd7
SHA5124395d2b636533064d882b330492d84f417ce22d40fffc6687e70a5f005a5e716127a58ae71e1fe2bcf3268a55debaf585eddabf39e516292a1e2de481c63eccb
-
Filesize
7KB
MD5e3c8b40c82751c613f430b50bb87f709
SHA12436559e20358caab2bdf1639450c92e9d67eed5
SHA2568ef00cd1242273452a05cd39f22e92d7e5379d0d1c100a4fe1bfcf42612778bb
SHA51251045714d443d0b4a6159e2590490c4ac8ed30c3e2d5f491298817979a5343aef6772d50c4c5686df03e4af195869cc93b26127f72f10c494caa7590da9a9886
-
Filesize
6KB
MD58b21a52ead7d2e6ac5221dfd863266b6
SHA175d2c2f7c476599b88ed97d702af6c09233bee74
SHA256a171e0555f5c548dfcc601492e47137dc7cd6b9c252e68e36d132ba276b0eb52
SHA512c29d5a2f01f167de22583f651daf7a066f17da9e695c2e383d3f9300bac743e54c0b964a7253985ec3ee1d4f6016d17c6ad18b2f1bc28fd1d60d820cd7639c81
-
Filesize
160KB
MD5d13769890e72ad497a2e1b8ef7381a54
SHA10b8aba8a565c37e7c34770101f33d55ab4355dde
SHA2566e56e3c153f3a96ba4f18fdbbab7a693459383974ef43281cbd1a98f6844e49f
SHA512f1c5ffd616e8771645ed8c61b1f5c2b6969fb0192913b643c899b97db021619346982a3555eabf7b9df634e1b291b597b8df7c828f781ef493441ef9f7063d9a
-
Filesize
160KB
MD522d371fa47a30b69d985b9a0ebd313d4
SHA1a2205ff8495866aa0b8e3f9d3e114a96b69e9148
SHA2569e53578e62b185462b774f27eb182d9fb069cd3eab1b0dd6a3365993b6305d44
SHA512d96c12525f69b1b143cb71eb40eea8245d8c32cbfe4438c445190f7940e3cfddcb5498254b1e9ed0ea6b34b245c64bf3f9297a4460862647af1ee9a5ed23737f
-
Filesize
160KB
MD5cee9a9c57d84137c5b2c676392240577
SHA1e3d33b89ef7d8db06babbbc997a51e8fd98afadf
SHA25621005d8a0613103d0e78557d46e38afc6d1d75ea24d14714b289b6216a5191ce
SHA5125032137a1bba8db25e8b353c3359296664535a5d1a809af785ed5d253f4d9b406a8a3bc16e8509c43e16012a98fc1e5917c129d71c99e1bf9a098de92745e120
-
Filesize
104KB
MD5cb05011071030930422e43f488bb0f7e
SHA16db3d25f7b705575fe2668d63b8dd8cafded4f54
SHA256b60143b72bd19157a91065f4b1e832000545ed7042afdd85ce02d906a6075c15
SHA512703bf6db251691d973bb9d1a5e92c65560224b2e19764fa25b90491525cbb1f002e55308907dd692f0281a8b6f77e34790b2cb5f9534a45326c6e8cfadf31a7f
-
Filesize
101KB
MD5cc06da288c43b6d25a064f48acebb2f3
SHA12ad39778a3b2330fefaed871e7d30bc11296be6b
SHA25636984a57cfb1625b621d28b8e1fd6280179f3ca0fdc0780a37f7e4beb78d3e2e
SHA512b154ae647033fb8da5e67cc9a5e6be213469bb1f52c3dfee085b26117e2c3a44bc57e58b3431787ee934ebdd72a51d95d30b1fb4f4cb8de472231aecfb84cb94
-
Filesize
98KB
MD5e72dc80a15448da13edaae07f0bf4f42
SHA10206f098d45daf1447fe363a8ac201e4fedb4c1b
SHA256b4533124360aa3a7ad9a151b7425e8f21e1833be3be6a7bb13812da64da5ce34
SHA512fd40e97db9e83d9a43e15b50eebfc6662b4ce5353f444e04168d56123f4308f5cd566d6ec35cd4d13890094d7e5fef9c8b0a56d298b926387a88c6ed430d4268
-
Filesize
98KB
MD5d7b10f3f917941d71ad412b0a18a08d6
SHA116b5c4bae87e9fa783acdcc96ab76e567969ba02
SHA256197c2a597ee66eaa13b5bcbc9a8b75f359877fa0f24c9b9056c595c1e2a8dbb1
SHA5124b023e01085d1f5c1e2f728bc4fc2920f7180f3bf136a6117d14393087d87c80d0c871fe2923ef6eee032d2498e4ba431153a482312ba194882908a490eb38cd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd