Analysis
-
max time kernel
1800s -
max time network
1688s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2023 15:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wearedevs.net/d/Krnl
Resource
win10v2004-20230621-en
General
-
Target
https://wearedevs.net/d/Krnl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133324416141850638" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1240 chrome.exe 1240 chrome.exe 924 chrome.exe 924 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1196 OpenWith.exe 5020 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 1196 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe 5020 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1396 1240 chrome.exe 85 PID 1240 wrote to memory of 1396 1240 chrome.exe 85 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 2552 1240 chrome.exe 86 PID 1240 wrote to memory of 4344 1240 chrome.exe 87 PID 1240 wrote to memory of 4344 1240 chrome.exe 87 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88 PID 1240 wrote to memory of 3712 1240 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://wearedevs.net/d/Krnl1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecbf89758,0x7ffecbf89768,0x7ffecbf897782⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:22⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3216 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3232 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4528 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4828 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:82⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5060 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:82⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4548 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2452 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5388 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3348 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1636 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3264 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4628 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5488 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4624 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:82⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3820 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=6124 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6308 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6032 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6100 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3236 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=6116 --field-trial-handle=1752,i,12160617966114720586,1109145569867093110,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3556
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1196
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1700
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816B
MD5752ca834c6c105d7eb347531af011f22
SHA1696142f58f346b1362f5b8ec7a15cc85ad40fc58
SHA256e9a930e4b0bde0b2a2da9b6e9fcb5dc0d32a5055657a7951d6756778db36cc12
SHA5123ed88cbaeed56a5fc7c5de7cb6e3ab71f360ad609041f5a60b7eb8d57fa882f6e7fcd6c13d5e0cc1cd6c717eb30cf3cdc9fc97dfc306526579db702d0c450b0c
-
Filesize
120B
MD5ef3fb46dd29586960d7d4760251ce3e6
SHA148d8bf3ac1167038f60892b38404088d68aefd01
SHA256a2cdfae1537a850d06df0c069ced136b6e28365a54979389079b6f58fac7547b
SHA5128dfefe33bd6e57e77872234ff7fef6b8d8b35140b54c6e55290c6399082db6039e4864b0f5ac123676127077eeb063e989fae640db9cf8d858a297e9028f4e20
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\00dd91da-4bb1-47e6-b2f1-bb5b0e7cd272.tmp
Filesize538B
MD5602ab3319ea063cfddd157756f1bf8d9
SHA17d19520bd573b8bda32697500e135efc76bd3a70
SHA256612aa45c612838dca89fab8b31fcb09e77a63cb9d7e4f722d58dbaed617de8c2
SHA512079a637c55cdcc71448e6b68fa175e27ff90d93bce41d65b6d47c3ccde0f43d0180331b5171ac124aa1ad93006fb3e3e563c05339e2a420c2af245318db618b1
-
Filesize
5KB
MD52397eb78054e06ac9fd28468176848e3
SHA1ef5599d0d1bf8df0c5c290b8089db4a336bc04ae
SHA25686ba4a9043b5104658f34220a3780bee9165e801f3cf251c4ef022934751c695
SHA512fb2f1c00f28b46d8cea82b556e6fc7e9a5ea45d942242b73cf82c19424a57cd7cb14fdabeb820d7689c05d065dde7e5b9011ea0b20fa5c20f82787a6122b3417
-
Filesize
6KB
MD53c0444fc887910b0bdf09d95a1434ac3
SHA1f994566da0c3a53ed2841799ee38f6f19defc890
SHA2569cd03b83d7aa4367df6009e9d60590a292e8b555c2ff31803acfa43c6d0bfaae
SHA5128ef22361388c7ba000cf2af9ec840f5e6abe82e45afb3dd5b88749c9cd4c026505b95b6e4880430d0de415131dd4ec237a2f792496131486b6dec223babc17cc
-
Filesize
1KB
MD58a0f781cb61025172098a9a7232a7ce3
SHA19f5285009f4e7d0dd149499e3ea866b9f082b740
SHA2563602a48ebd486a67673f6f7630910b999caaf15ef05a9d0bdc0fd13239df714e
SHA5125ab1295dc573bab9db3ea3a18895cd709dd0bc0ddbdfcd11b6731d66f79f209df54ddf0ac1ef690f754fec447ed3ca5ecf851761142f7304a5a496fc01623212
-
Filesize
6KB
MD5b73215fcc35c5a3ebd8dd7651ad13288
SHA15b4b9ddabcfd9ad6a609e387224ba98e401757e6
SHA25618750f4cff7f3e7b5b376e3480f9d0f565a2189b8d2e3131a6b096cb97fa1bae
SHA5126ab631541a79db50792f08e434a641a38e0458b2698aa501e2e363e4e2398183cbcdee90f9b32d1a9378c919c2ae845314ed8a46ec376134af9f591ae8e3b258
-
Filesize
7KB
MD54d2468f1c9da548fdc9585513cff7462
SHA1bee7547ed3e844d20146d87da589a4845c22cf3a
SHA25655a1f714eac0b9c221b0dc7f122ed34eb8439f8bb0b9de947f624cfd6249d611
SHA512ce751b16f699ebb20868422be96d34bcb76fc0ac896bd6900e4ca932142e393f23f3e12ba1e2d68d6c7e53c1fcbcaf51ba435f289804f3f6c6075c297054f9ec
-
Filesize
7KB
MD5a3d4244651297fd4671d1b6bf66ff27a
SHA10dfc5257c6a5720909d0422c6545da8773c6e9dd
SHA2563baaa564939d620a444327e5ad905c361079fc4f7914a3df58681bbfc82b2e2b
SHA5121a2ffd7d4af75a0e01e616d0b0e45b6eca0ed4fe0f20ad8be361c76da72131afd3a3fa41d3153209e32209530664f6259b1007b6a32690ca958a40cbdc777e2a
-
Filesize
1KB
MD522405405b8bdc920b2ca0136b1eae02b
SHA1dc4f48e529866943b98695fcf3dd0a5a6be2bf43
SHA256bf4cd8d56b1d8d14c225adce9982d89e56615f36ab99e3a09eda857cc4515dde
SHA5120bb4010fcf8e0e6434e64980feb402c0274c49846041a4e3a6f590e600cdbd920b90a3ef088f2541041f0ddcfcaa235c8221396814aebcf06a74127ece65ce8f
-
Filesize
1KB
MD57bfe31e4fd9e9a35e71246e053b72aca
SHA110a310188e351a6e61fc2557863a363ae05e75d3
SHA256444f7bfb9df621bed1dad245ae2ebdc4adcb09018023a3de61539bfa5f4cf60b
SHA5129305e0675a73eb11007a28f72f9957c070f9f4cb2c7577836c24dcdcf570c2c7b0d004a144b630e4b76a287c88877c59ce8628dd41267eb058679be2e770d0ef
-
Filesize
1KB
MD533740507a8ebe323f10e485f25af50f0
SHA152f1452b208ca6852cbb8c50415c5f952fb702ab
SHA2567b5c29ee6c9966956da5c0c5d2c244c7be7c764955095fa3d673bda1c98d0dfc
SHA51279c23ef974d32bb9345734ecce28082fb72659056610e9348592c7e8365c538ca50ad08eb6d6680808a6cdb43929e0d53267f47fa779cf97c3cc6ad533007ebe
-
Filesize
1KB
MD5543a3c0af9501fa6d3821216ae62e4f5
SHA16067ee3484da62a55afd23d560633cb0afd17687
SHA256246e5356d755d89c3676d3e8522f36736918f3a50c822392fdddafbb106e955b
SHA512116fde3335fc1b27f817a3a30da5b179e254ec552b17dbcfc62064822f488370c75b1da9602edfa7b017c0b27ff39a5c35913433cb149b9234b967ddb47a9ea1
-
Filesize
1KB
MD53dfe86a482db56d11d6d2db9cdb5fc61
SHA131f5e6b03e0248b31ac0faad5032c5dcef87b37c
SHA25649e1020d5ec297b3e45c33250edefe94fe8b2549d744529931a5584b20961f7e
SHA51210bc2f1adb0942dd216905eb141a83f646f0f941fd1a32efe81c9415f84d3312889f86c2d611ce186be9a30ff3ed6a12c7bb67722b4f9e589a46a82a31895716
-
Filesize
1KB
MD512b568b81632e5c87ae0047724844509
SHA187f6bfee5c49000a310c09aa1c350e08f27dab30
SHA256c035f616cd0659339d2f070ae05b1eb2f233f11dd5ef988014c634af81bd4422
SHA512f5a0648091076c71010942ea24cd5cd5a568938338b36d0603e209250326bd8d0f57646d710b51909e0b6c74d66862483a57756b548f492f4f9815f8f10735ff
-
Filesize
7KB
MD5c1cbf56abd98c7393cffac65bd941e55
SHA1ffbf4b7215af3b4e5ff2d91251e6b0c705e8e819
SHA2567c42be69549b09aaba865028a29c12651ad2105b2dc3df00339d392b7f4c7525
SHA512411b30e2b2b29134e49e9364038bc1523dc7c89909c2484a5792c1f825115e8721f3b9e24ba1e1db3577dba385ef5c524a200eb7b40ffbc694dbf9c1e7ed3ae0
-
Filesize
6KB
MD5b9a2206b7348bcf650c96e6661914a02
SHA1e93df94bf4fa28eeb9df8553cafc88630b3bb098
SHA256cde9021d76f3a2f22f67f681d7495006be45493e40eddab9e8f2d74401770e7d
SHA5125cd3f307c958d964221e4607728883bd269d19f3a1cfd64cda83637207934cf9919c8929b087d77fdccaf28f980cac4aa215d6203f436b1d6b6ba897e6dd6576
-
Filesize
6KB
MD5f714873b689b0a7adc3489bf57c82964
SHA1ac295e2c711b7c58de0c7e35ab8ab6436193c553
SHA256a3c06a3afc776f4803de810adcdbb8a31f8e5dfeb2680e4e0943665cd25203c4
SHA5123ad0e2bf4cb29310777baa38d697cb9e9573094a9d1131bd37311420476a89afc0f217b3b8d09d53feaa140d5324dfb647d382c85c31fabb98f235a62eb4f3a7
-
Filesize
6KB
MD5dbbef05cd0188573d5972f9a774bee13
SHA16d93b9909ac35e0bc2a54ab95317c62c62503fb9
SHA25651dcfeb492e26cc70807551fbf2bca18b924b77a04c248911fb3a8e7362fae14
SHA512e489c09f06b132a0e237f7ca720eb790c730bde39bae159ffe4b9b343a3eae17695c3e13038eec75d394ae5e2202186272cfd4e2998178b5d606fa1e9b587885
-
Filesize
7KB
MD5ee844d42e023e9b07f78e28ac921a620
SHA16a88fdb6664396318007c0e991a598f4e584ceb8
SHA2562283eac6c33951561ae5ba9f5592f942bd515ac85acf9c492db2d79503a77055
SHA512cca2d4554ae4d6f2a32f8697dea6764cee625fc7dbad422aceb8e6865665ed24fe158020c6cda8e36cd3aee42a4bc73c1128315eb14c38fa590262d18a3c3a32
-
Filesize
6KB
MD59406a792a0cdd9bc66dfa563f72fd6fb
SHA12caddc805cf4cf484818072c696fd433ed4ba6cd
SHA25681569e6e6b77c3e482673dc692c636eae1d03e60a0852f3faccc63b1c82780ff
SHA5121938bf89786d5a5bad85dc1d1b2949b7bafb2acfdc469e63ed88b189cdce7417784b7557b4d4c8fc74ee75c5e7d6dda2310bd8f0fac58687f884d588f16fcd4f
-
Filesize
6KB
MD5ee616b27017a61957991d88a8449a89e
SHA1da32aa6e8b9dec08552cae52389257c898ab1742
SHA256a0736061fa6dea21348dd740a1d864348f095a92f406ac7a3b98a92a2e47e2e9
SHA5125f286ba994f0b5d45bcd2a16633cfa89f4dfa4a1bb21d8bb6635f449731247bc97229f6db7d302a0c7aee88aa22445f5d3d2f97d2fa2d98e8b3d9c5f6a97dde2
-
Filesize
7KB
MD5295fbe8e5e07b272627a24b719b9e473
SHA162a3d81d17992e271401478989b3efa2c6fdb56b
SHA2560b952934035bf8a33f88b5bf0640bb9c9477c109effeb2917bb12b3fed6c0ce9
SHA512907c4c73aadf04ec2f1ac79261912a4d66aa6e3fc9e7e02a1f0462d7ceaea4aa9fbd3d2971f0bda2a8a5db030b2049232d9db2e136bd563c8a05b37c4ccc0b50
-
Filesize
15KB
MD53d2324ad0838714d2efb1e3893cad03f
SHA11fb6d91d22d9815541448c550133d75efb0029ae
SHA25653b962948bb7c341b6e61b6bd6954eb1ec9db135bedd9f36691b674b2c9eec86
SHA51278d270ffaa73854b02d1f9a405795c018f3bfaa3f0b0175c55c9f9b96ac986397e0ed234cbfff8a48d057dd4fbe98b1eb6098caa4aa3df1097883da2d42df30f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b6d9ee39-3438-46ee-b4e2-86ac80c611d8.tmp
Filesize6KB
MD5a4258880916fa50fdd680278256216e9
SHA167281b0cb1a1ccdc712665dbec4502e17f5f6755
SHA256eb5c8e20b3b0306e94d3790956f8f73a4048f17c94b74d4740e76fda3cef16e1
SHA51220a2b5508a870e5430864981ff7a3ed0b05bc7c62cc88a951ca1c9f87c771c43fbfd07d67ea70ac19b7cfa1cea4af0e26d543d9f8a16b87a56ab5019350da5c8
-
Filesize
174KB
MD50ad749b9294277e047888ee81b339da7
SHA13866b86c120c126ed3e70e631af062b6fdd637c1
SHA256206ebb09a268b454910939e91bb6da7e67eb97756e360600875f4c93fc1362e7
SHA51280297a275e2392a04ccc3d2e577558fad4ad2195e81852378a630618362bc0e24151673707da83442eca3344ece3ceb6f9e753032983006b4c2d552701f1ae22
-
Filesize
174KB
MD58ca795a9284b2cba48ec1e7668830442
SHA130071ff302777d219e358c1448afa9d3395ab288
SHA2562bfe205a745adbfe8f445ecade6b9879e8563ac1a5a2f5b6ef34544c29d4ee38
SHA512970789d4de75f87e3bec9964c58b5a089e0aff2d70d9565c37cbcda578fcac9dd17a3ab1f4a5d5b3c17d693a47a1e2b2e22383a29b4627ee309fc58bb1f5579b
-
Filesize
174KB
MD512062950490bc1c579b0ffa902081e78
SHA1e7ecb0bd13bbd07f638c66fe8aee62eddc3e347f
SHA2560b3d2a2a46c44e56863e9e064979869366a03e966b14e028f7d6ddc92bd58857
SHA5128b6b2d1328933a6451fbb83deadd352fa890e97f5fe88f667cc900f5318b846ba2fc0537494d1026136e0a4c587f74c9dd2cd01e845635f6dae6032fa8e89c57
-
Filesize
174KB
MD59431b24cb3c5f70094e0758f1c8bcfe1
SHA1bb1d461d52b81aa39fbd1d70433d22c927b1ed44
SHA25602d79d35774321f0bedff63cde680a78f2d9e77932cd7dd0d6b75324dd3c2ef6
SHA512ffbf54583ff1476ec2e25d650f5dc00e43d76570a70a6795b5ae11ca30afacefadceb81db03a60926c65820ddb7efcaff2cc278e54f5a29e9119cb8851414b3f
-
Filesize
112KB
MD549966c3bf5544106d30bc3ac4a7b937c
SHA1cc9944ac0af7888e4b277cae6dcf2a339bd3e338
SHA256b1e5b10fbfe84772b9b91be691a0c281f7fcf397288d19b79b79d95122376453
SHA512074cc3070e49522837397b47b1bd961bd38171523af58ec4fddd2eb1542dd9bd14c20c8805e462c5fc5ca2261a09ecb014a9352b1d97570af1ff470b2d983b35
-
Filesize
103KB
MD57b673f7b09e393d8e15976f59bbd041e
SHA1c1da971cd899fc69d697cee970a9d23bfdd5f7a1
SHA2568edc03b67595aa642430086995a9ea5ccd8269d578e8bf54093568ffa51ecaff
SHA512f0ac30eb326a8d6bceb01ff065dfb075d8cb30ee1d1ba518dbc51937a241d45b1351e9d195449b65d8ced3c028619e635e8cec70d0494d8fbf0da895e04ef1bf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
5.5MB
MD579c6e7a622b2c1379a8144c9d1ddeee2
SHA1f60e0fd39d41e2d4b0ed9fda16fc8f54e64d2b71
SHA2562c21ca7f232beffd48a26b0efb80cbbe93345184f29eee2cf175c73d6822c204
SHA5120c5c612929d1668ee7c40e210b0f8520c69f8917f1de8bf19fa932900c56a22ce1336f8dc5b7d410633f26f4157130a2583b3b94f0bc849a49b84decd3ae56a6