Analysis
-
max time kernel
1800s -
max time network
1688s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 06:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://css.developmyredflag.top
Resource
win10v2004-20230703-en
General
-
Target
http://css.developmyredflag.top
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133337913545176505" chrome.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3428 PING.EXE 3924 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4168 chrome.exe 4168 chrome.exe 4436 chrome.exe 4436 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe Token: SeShutdownPrivilege 4168 chrome.exe Token: SeCreatePagefilePrivilege 4168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe 4168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4168 wrote to memory of 3344 4168 chrome.exe 46 PID 4168 wrote to memory of 3344 4168 chrome.exe 46 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 2348 4168 chrome.exe 85 PID 4168 wrote to memory of 1408 4168 chrome.exe 86 PID 4168 wrote to memory of 1408 4168 chrome.exe 86 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87 PID 4168 wrote to memory of 828 4168 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://css.developmyredflag.top1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8efe49758,0x7ff8efe49768,0x7ff8efe497782⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:22⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:82⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:82⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3420 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:82⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4828 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3324 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4812 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1392 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4764 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5252 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4596 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4484 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5184 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=1792 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=1764 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=1728 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5280 --field-trial-handle=1916,i,10978062797048781624,11346431938354441672,131072 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2468
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:60
-
C:\Windows\system32\PING.EXEping css.developmyredflag.to[2⤵
- Runs ping.exe
PID:3428
-
-
C:\Windows\system32\PING.EXEping css.developmyredflag.top2⤵
- Runs ping.exe
PID:3924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59b69f15e3a8086b50cac8e1d8eb1dd18
SHA102f7540840af052b89250e5e4e49b63ce535de7b
SHA256759fcddce4d2a83a8857e16e22f588dc917f774f67b391a9a55b02977b626f54
SHA512aff6340e6ec2431f3a0f4c3eaf458c4c113d3a58e809ad25f585b0576fed9656d62676305e75206bc5ee8a272c86a1e157668c9909d11d2e0d867974b8e8b3f1
-
Filesize
6KB
MD54cb6003273dd36b16080df0fc3a85f75
SHA18ca22b1b5b6e77e438f49096a30360006b2a424d
SHA256a33da6f286bb29d3ea7596af207a8fe858bc8c289e74e76e2e9d1487dd5ac90a
SHA5127160179b36f4d2782661c2dc26038a1322411ce350d8748e6744baae5567dbfd643299e2407ece93c7795eb28c90ec1d5042e737fd14ae12d7694df2dbae5188
-
Filesize
6KB
MD5090a956d811f9cc26cbfbeb96d6fefe5
SHA18705d075d62032220657545c797b8a802344e3b8
SHA2563bbe2b7677fc33962a643a0ccc5da3c3a0894de0db4d836d1fb45d7d2ed1d753
SHA5122e38a4d3816706df843a3689cb91f7127401d0db54c091e31fb35b0fe9b17e9f0f20278b9d92370ab1147d63485aa6bbbf6be5e98273697b36cc9d1cceade10d
-
Filesize
87KB
MD5042b12094f95a2ed183ae3e76062333f
SHA167e341e99356be1bc26257ba0818c724f9048313
SHA256bccd9bb4f5033c87b87e4d771312d685a64930819266ce46e7d0f01f89b5dccb
SHA512d78d61b64887305a40497374e996874b27d006da61ec0e1b5f4f35b611ceb497240f935986b6fe582d7c37d533dc49dfffc549330be5b5968f019681dd2671b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd