Analysis
-
max time kernel
158s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 05:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-au.mimecast.com/s/Ud8oCwV17BSGg6AQiVOApf?domain=console.ebsta.com
Resource
win10v2004-20230220-en
General
-
Target
https://protect-au.mimecast.com/s/Ud8oCwV17BSGg6AQiVOApf?domain=console.ebsta.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133313670147254896" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 3536 chrome.exe 3536 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 5032 5068 chrome.exe 82 PID 5068 wrote to memory of 5032 5068 chrome.exe 82 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 3644 5068 chrome.exe 83 PID 5068 wrote to memory of 1316 5068 chrome.exe 84 PID 5068 wrote to memory of 1316 5068 chrome.exe 84 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85 PID 5068 wrote to memory of 1648 5068 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-au.mimecast.com/s/Ud8oCwV17BSGg6AQiVOApf?domain=console.ebsta.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf8619758,0x7ffdf8619768,0x7ffdf86197782⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:22⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4508 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4648 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3936 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4856 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5260 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:82⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5504 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5416 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5660 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5424 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:82⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5732 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3368 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=1668 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5352 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5656 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5344 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5836 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=5912 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6032 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=3448 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6056 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5008 --field-trial-handle=1812,i,13140559310807806983,2594301823329750065,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD54e1a111162cf36d1fef46748cd377de0
SHA1e1fd082894e0e889b9e9378cd233008d7be1030b
SHA256dd590be874e55aa79cadce94dd398e9924198f4ca9741899b6ff209a3b541f5e
SHA512f895957b530cbbb50c948986eda8e31253dcc41a147cd85282435735d00b38f85b75a8715b0e4f7b00de2d6ba659f7b60c4c4420bb525ceccfa89480e9d19fd6
-
Filesize
1KB
MD55fd7f090ba95405a4bdb919a1c0ac2e5
SHA1fa55d60f97e18f798159873a5a17fef027e53e94
SHA25657208e6e03920837a902dc3feda709ad119f311978f38d68be2c4dfbc41585c3
SHA5127a56c1af3f2c721bba5ad8c573cf9099f7d49a26753ba7730d1ae208ffaa746db27c98adf746b33ae857a403b064c468bb2205f4077390f10a79613d3f96f72d
-
Filesize
216B
MD520d024d8203f5682399ffb722b2aeed9
SHA1d230a873b030103d835247759ca2253d0d39559e
SHA256af390124fb6d2d6e241f66968cd78e6b5e4d42a5959045770050c7606750ddac
SHA5120eb2738703efbfbf9befc78ca335b76059b3fc80fe21cbd523bb9aafa50739acb85a23c8ad268e05574ba5b0ac65287948b55f1df912575bfc0decce665dbea3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
8KB
MD5e2b39c48cbda9e6fe3a25462df4527bd
SHA10553fec696bac8419c11044e830764bad548ee21
SHA2564f55dd6f5ddc4739f388989156975c9009e094d0d4eed9c12174953e138dbf78
SHA5122a4f3f3c0bd1446c8dd9f7bac4482380d9dc390e57215f7685583f1c2ef6b082877731c362ac319bdb10c1edf8ec806c954751ce3ef480c38b48faa37a296f51
-
Filesize
7KB
MD574d5930bac9c954f5aefb04ea4f63e10
SHA14a4157bec06f74bfeb3d77595fd0819fc2be3071
SHA256037c1f7a68c75a2782716246cb9fd807d105ef839dcf53ae2c5037e1a39204a3
SHA512ec72fa60e57e1519304d6726e531c8fb9e648713bcad61ddbfad91a406c68ee646f89d8f421ab89203a15b1c57d037ae0a5403b7af876325554b5a1db44de088
-
Filesize
872B
MD536d1c6e1ff5aa0a78a0f170d29b06558
SHA108e3a92abef91ac20cf32d090ae03450a34819ff
SHA256e6d7c467e08800ef9355f05ff6349da3570a632102a62c521cf742f3e2c5bf20
SHA512bb65402fd611aece45196cfa87c9682bcdbd5409e9496ac338fe336d80ab48b40648f350fa1aae29e1a20714769f3d9e8203026139c7f35aa1c03bacdbf37bf5
-
Filesize
4KB
MD526cb6945a23ea728abaeeade252c2072
SHA1ebb183f327a64aacd48ee9ca80c72320b8b6db56
SHA2562ee1ff40e0b8cd1ca9aa18c3fbfb5dfdfd24bdc5b755e73fde6daa83fe14d0b6
SHA512817e78573d74687be039b718196497cefb7caf9b2f7cdf80ea11a54a3fb335d2072bc058dd15a751d51d4a0f6e649b63eef41c3f91363fb1c13955bbbcf51d13
-
Filesize
705B
MD55e66a63e926991097d378db5c54a3a6b
SHA1ddb72ee1790111c48cd71f21d4d40f849ae08cd9
SHA25602747d294117a3ec6dba049924b9fb5ecb24cf398dd6dae1324507cba61e5f21
SHA5127c4ee39764e32618c82307593e0a5fe620efdf9ef70fd68d6a4db2583ceacf7fccbb7a6247e429e484ea43098e26f0baec43edb82f340fb358b9b632c5346f8a
-
Filesize
7KB
MD55c5a28dc7356a116e83416e80aadec17
SHA11492965ebc8c016c3534a856efd26bf1106d74a4
SHA256968fc93026bcfe497702bc65a1213203376747ffeba1ef06ff277a1cfd77cc51
SHA512a1e64d6b10a297baae4990348cd9a7f14dd23b4af0876e94ff8108a478952218daeba070b3fb96e1ff65c108d67863f868b5cd8aa671824a1d8020a4a6ca4371
-
Filesize
6KB
MD55f8c222ee42d06b40e977103884f0060
SHA1376b62afb40179d0113551cf4694134e3998c3c3
SHA256b5e78aa29a29dae18dfff6e71ebcf0ec7822765d93added311fd4d74652c96a3
SHA5126eef2700dc59756106ab2b0f01e0c27313cc16ffd9ae8f7a399347729e8d33d9d99013a1335d1888ae9ff9f06f611dfd5215de01a3ec2eacb18da2b9de8b0362
-
Filesize
6KB
MD5e0261e0e7f889a58a171df34d67bf6b1
SHA16d099a02e62d1e329d6017511207548fcc31ad54
SHA2568890dfad87065e5401e6cbf86ae3abdbb7b1fbdaafce4d51ce3ebc6cbcd1939e
SHA512eeb8d645283c7f4517a3e20df09ad02dc851d780cc6269b660ab2126bfcce4565e4153ef20ca0073dc234b7144563c124434e21826c6734f37f948bcaa289510
-
Filesize
6KB
MD513173671034770c297431becc6092f44
SHA1e2fc21da59ce7759f17684c612a4b6cfe12b315e
SHA2562ddda7334095fd009b81ca31d4e39dca5b1f3c638e341d37b807c11ca057b443
SHA5123c6b6ee8ff3bd9d04499f689af93e3ee9861492f3a6be4aabbc31faa29f4fd192a5e04c65e13ccfb77ce98c0976be55082490798e3395a732f96722eb39eda1e
-
Filesize
15KB
MD5ea2bf168109bb6f8d9dbbf59d9b216e2
SHA1255f47833dbbf88e50812e5cf34347255113e310
SHA256022edd1ec3f0bd5fa50f16d7d302282c4b9c6817d88f550f9d9ca42af09af2a7
SHA5127870c135eca2344dd1ce53fc1a94577d04ec9387ee29692f48af1f93d0d0289e6ed674a16b06110698a275a54fea93ef77009327965dfff6c29cdf4c4a328d04
-
Filesize
15KB
MD53838a9cef0a45444b98dd72f77fe0936
SHA19feabe070f2e471088750dc06fc772989936c3ec
SHA256d5784a79eb6c6abc0c169a9654ee45b151948f5d71c7aeb4d25642348faaf081
SHA512a7649dfb8e26575857c1afc80b0d94f83d1b078f203801b820f919bf16193ab7232df3230d99ab8e49bbff4a47da6ce92b18026c345c8813c8c23933e0a091b1
-
Filesize
161KB
MD5092065f0fcbcc7759bc4f930387d31ab
SHA1bd648753618a5de32a0ab05e33ad10a0f38e279b
SHA256dffe7b352359dafa0ac5bcc1fe8df5c4909ab6f7d3035f4320eea9d78d4e69a4
SHA5125422cc03f1c132dd908ef08c3d2b0eb91a306ea3a7b289b687c8795b11c8c144707c9ef241831593bccb13a725c893ebfee03909d2a694223b98b06b1d75bb70
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5068_1975860809\2ba08088-2dc7-4315-bfea-a70c4cf9f555.tmp
Filesize88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5068_1975860809\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727