Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 09:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa01FWlE0cXdTaGZtdm1UZEh2akx4bWtSRTdJUXxBQ3Jtc0tselBXZjk1WGo1Nk1qYXotYk43ZnpVWjFGaVlQalBDUXRiTmJ2eWt6UUE2aWxtaE1jMjFNSG1Gc01IRjZ4Mjg4Q0I3SmlmS3JybWxPd3EzWi1JU3p3MGtwTVJXTFZkSlNjWWt1c1dHc2I1VHR3YVoydw&q=https%3A%2F%2Faifabricated.com%2Fshorturl-fh5-stand-mod%2F&v=2s2l8hIlXxQ
Resource
win10v2004-20230703-en
General
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa01FWlE0cXdTaGZtdm1UZEh2akx4bWtSRTdJUXxBQ3Jtc0tselBXZjk1WGo1Nk1qYXotYk43ZnpVWjFGaVlQalBDUXRiTmJ2eWt6UUE2aWxtaE1jMjFNSG1Gc01IRjZ4Mjg4Q0I3SmlmS3JybWxPd3EzWi1JU3p3MGtwTVJXTFZkSlNjWWt1c1dHc2I1VHR3YVoydw&q=https%3A%2F%2Faifabricated.com%2Fshorturl-fh5-stand-mod%2F&v=2s2l8hIlXxQ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133369119542814508" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 220 chrome.exe 220 chrome.exe 2748 chrome.exe 2748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
pid Process 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe Token: SeShutdownPrivilege 220 chrome.exe Token: SeCreatePagefilePrivilege 220 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 1212 220 chrome.exe 40 PID 220 wrote to memory of 1212 220 chrome.exe 40 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4368 220 chrome.exe 84 PID 220 wrote to memory of 4028 220 chrome.exe 85 PID 220 wrote to memory of 4028 220 chrome.exe 85 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86 PID 220 wrote to memory of 1768 220 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa01FWlE0cXdTaGZtdm1UZEh2akx4bWtSRTdJUXxBQ3Jtc0tselBXZjk1WGo1Nk1qYXotYk43ZnpVWjFGaVlQalBDUXRiTmJ2eWt6UUE2aWxtaE1jMjFNSG1Gc01IRjZ4Mjg4Q0I3SmlmS3JybWxPd3EzWi1JU3p3MGtwTVJXTFZkSlNjWWt1c1dHc2I1VHR3YVoydw&q=https%3A%2F%2Faifabricated.com%2Fshorturl-fh5-stand-mod%2F&v=2s2l8hIlXxQ1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a4b19758,0x7ff8a4b19768,0x7ff8a4b197782⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:22⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:82⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5064 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5292 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3256 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5728 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5736 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5852 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3876 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5076 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=6240 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3892 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3188 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3284 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:82⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4892 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=936 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5144 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3192 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6228 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6052 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=4792 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=3228 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=4488 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=5048 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=3044 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:12⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 --field-trial-handle=1880,i,4639343831168014401,12752238674069505855,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5058966172b47036869dcbac5c995d845
SHA14ed416665a41bab7141c83d6352a4bee2e04dd6c
SHA256d8f641f4a2310c2c58f713bb2278f6d2d582e6a5f54f1c2e512dd70df757ef77
SHA512f4a45ba5388109e770976337bd4d2af5e4b029358fb3ef2a2c979af47e4fff97b90d0bff788496ed3df7837ff478daa220fd725b6845a3090b3923bc82d25ba9
-
Filesize
49KB
MD52d0213ad8d92a7cdce1aa57ee34b6e2c
SHA15ee81207ea491136dbf5f94cac79ace762975a0e
SHA2560fac0a78973e15689844ba828b40351907236c8efe5690ddf8446b8803d584a1
SHA5121f36efb3fce7cdcd7902359c9c8b519a84de232eb8415c32844e49960ef28021b1b389a876995f21704c54eaa64c167854734c9efb98cb4484e4c4f7026a505b
-
Filesize
106KB
MD599fe6e1eedff69fff89d6b63aeebd914
SHA1a7474d39b2b061a84b2018fc45dae24449431db4
SHA256b1dc9c45d2ff59a302c326970e603f5b6c2466766c83039dd09126701ab8bec4
SHA512c0502f3f40749a51ac53df8caa6ccb4abe9d3bda67420c22acc019b8248778dd94cf18026047679150fc0061f3b9c8cfe2b150f941b06b602b35ba6db3f0a014
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
76KB
MD55ef9a180bcad3b7cfc72cb45ded1de5b
SHA14fe4730ed558ae72d78c5483e07ff0cf33ea5934
SHA256e1c38d4048d577a513f652c10753fdf0e621f1fd922568d46f1d30f1ceabc0be
SHA512c6fe5a224ed3123cbf1f66d12af74abd2aa7042fd2eb840152476f64190c5b0076edacad7f076ae3bff3a1c772e804243743a4f28a7ce3d54a9727d8ea2bf787
-
Filesize
74KB
MD56031228a659c4d6d4526f7c633421d76
SHA1183854da5621000a1eb486e1d0c0bda04e09946e
SHA25639d165d0246cf266a2c9152987534e4fe0e2b7e2182d7146790ef1198fcef68f
SHA512d68006e0c009516bfd5a7822a771db4a05d2f8f9539ca2b85880b8ab1bdda15ca464968207220c41ab8fe6234ae28c28eb59b11672accb4e518f96ee0c1eb274
-
Filesize
131KB
MD5d9e7233badf3699ec05dded5a633ebc3
SHA12d7e5888e19e57d24b82ff137c8341a6ef1562d0
SHA2564e1ed0ad5a349921ee7300912a06c12860f793a2b4ceede7bf506cbec9721e7c
SHA51277a6f8560377cb7b0088425513465abf764f2a34bdf737a32a75655f764e8af876f53a5280e55e23c125c340ff946398d0dcf0879496bcf39690da84a9f6b737
-
Filesize
49KB
MD54a23e5a38d7be4dad32dd959f219688b
SHA13a699107c810e61858907b946ea97e2f580214e4
SHA25673baaf2b879295cfdb6835e2372b36fc36a60d40893314d3b98de46265c181a5
SHA512a1183471b4eb0d342633e5b1094aab6c351aeca8b7952971f084800e5c5ed1ebd33cf81e87493fd90232df2e1739100177fa1a69b826149638dd1bba4fdedb35
-
Filesize
49KB
MD5603205f6bf0d290ef12fdb0234cc105b
SHA18d6d9432d7ffca260a1be4182a214001b3c26b3a
SHA256570837b23177ddb647c6a7a021f4d3caeee792cadcbdf5200893eae61ddae427
SHA5129ed515e1ee9128b4e0bab765e73e1e80878586e8f4fa291eb158a146035f61b895f1d4de38493b68eb01d97fbc3c1846f5248a2f68a12333feacf8c3eeb93c98
-
Filesize
49KB
MD50d41db6f8ba8f1b0757985aecc0b8b56
SHA17c180b2049be2abfae5c213cf54edbd39ddc676e
SHA256dbd217dfd2bd9852aee9268eca1335d493cd8b9b8c7b7ec98b7f91491db38c6a
SHA512a1ffdee31a099c5050bb58e2292f6198144e91445bb63556beefcb8cb8a60c07f11f8cacc37a92f7335649a1acde94b614fa3e07c8ec348332f608d5a7376b03
-
Filesize
49KB
MD55336a78db784b866721adcd11b05ea86
SHA16da0747a8cd9ae829fb00c593dba506086419db5
SHA25621e70a3b700b8879ebc7ea7c12c8655115bdb8c3b4e63dc356203d4e59e1b06a
SHA512173221655f046a05b0d87eb60cae9538e9c856912745ba8e75cddc02377f58af184b27b798b2dfcfb8bb941e7389a2a589f63ac7e2e30a1d4c93e2dc763460fa
-
Filesize
49KB
MD5dd07fc54a0769a33738af262fe04c72f
SHA187274f93ccf96cdd933fc6e1a9cd63196eb423f1
SHA256f80bf8d5c0c5a671a60d7981c26426668341a26c2e466c7b33e231a0ca049aa0
SHA512a2bb7ff011b10f15d5af3fc9ecc142faba96a98a344a426c967fbdaef60b3fcad521583480632dec176c97e332216cfe240aa5cd60358de149c0322813bdbe84
-
Filesize
1KB
MD58fb3619e884e685177eebf3ac2e81218
SHA15b0db60a9f96fbd12c0584ca2ef834ab8b83e21b
SHA256ab7263721f42ca469640719c474c6884a9185fd5004f543eff5113513eecd88f
SHA5120f6bf7a8a2a3f77aadcd64b4eda8dc3f89cfbb65232b1e4e6663bbe04c25757d6c732bad63ce1d6ab736a2f41c77d1cf41d75ab310c2b320a08444cc0ec065fa
-
Filesize
1KB
MD5259860f720152aa2bf1bc354e958325f
SHA18a1cc1ae45768a479bc909b7b26a9e4beb84d066
SHA256f513dd655779dd002f78d2e54020d2a4da7c37c4eddb898b6eb9efe6c51e11b3
SHA51232a64d42dc80a46884285f085def5c197045ed16f2727dbbc3b4b27a36fca7b1ec9336d87301867d38ca5e4ed56115026e22b9a3115cbe0a67159ab0ecf3ac5a
-
Filesize
7KB
MD5166dc3c50a0b8f05aca3d31acf4771af
SHA16602ba7297f0812e29c455110906604a38906858
SHA256c2eeea4bd618d90846ae70cc3dbe62b0b46264b18f58da7f419321069d67dc66
SHA5121dddb8fd5381be5924b5654300ccb3fc550607462e1134da620bd88ae7d8581b7092628969c001a113fa686e59ac3de067919ed4f28be220e7e44c68575d58b9
-
Filesize
5KB
MD54f357922f6d9d0528deaecfa4d3d2337
SHA1f0a67822c066b41e01257ce697f8a767f41c76e0
SHA2562302fc046c985c30256bab89720365183d4f76d98a63993d82e0b77ed156e868
SHA5121e0d83d137177d9f257d71432504d8ff64e918b46596f1c8cd0708e12ea248deda85b0d0e2aec5916a850d246afcad47929312aee6144b1de12c4efdba2e8036
-
Filesize
707B
MD5b261f3e62215b469f9d7997ea3b4cc6c
SHA1e546018f9b7f9c5bdffc6eee2af6284080468824
SHA2562f18f4f473bee67e2227472a24f08c5a2cf3dbf11af9dd786bf97d06ef9e9c6d
SHA5120d761321bffcc328d3765bb7ea4c5eefd127fab1134afd33424c28c78759c51e5d4e4ba7534aa392dd201487d5833ad45527579293c184b4afb391703d0cd014
-
Filesize
1KB
MD5ba835db8d27e817c7d18438b62ef4946
SHA1cd5c6c105dd7fced22dae7a6e2b523afb9338429
SHA256ad17b48e331434b3189b57ac4055a0e61ac2dabb39bcb8274add1c13ad754d79
SHA512417db47cbe216acf9d32bdf7db36ac8a2c997a45f4677ecc7bd95a1ef1070f46482d64d2d400380d3889423277f8c16079f2a14dc148d0d08357ffbaa2120d31
-
Filesize
1KB
MD5062285b5771ca8de1544a9c01da5af3f
SHA1f58b851a45105b2c49552acf9dfe42ca8c25f0da
SHA256b8e768d7f7a9272edb56c771f957ec2722df8fed0aeb031c51a6a20d7052e496
SHA512750336844d78544a6f4919bcde4d7519121aeb02e82cb8b322b2da4b0b6ab9c4a99789f381b40eb347f27c112ad081557ed184bac25261b6948991e7bd201f9d
-
Filesize
1KB
MD58fb67fd61a14d4bb3f25aecc18a73450
SHA170aad1436148a50cc1827a776090d7a4e4c88daa
SHA2564e90f59eb61ce0c221d6ee884f9eb5cc366f3df27de4c8a551af309bbfa82593
SHA5122dd251472a0cf5a4d46f5ed9e4f7efeba8828d860bda2ddf6e98aa48b1485622557cda6b44377be0789a069ed81713e066edfd49066005f982a5a418bfc8c817
-
Filesize
1KB
MD5f448ddcbda0a61968fdbb59087540c59
SHA15aff3f18cb4640ba4936e6b2981e95f8876e8b1f
SHA2561d61a2a32b5eba453de4a025a523b2014bad586d2c0fcf0e09b7ac5c71cd2a12
SHA512545ca65ff3e6704bdd395e9d136a4df862d308fa9b223b98b8c69b06218267d843a803652b6d2c9c7fb76c9a89181ee3af7b1e9f62d6547297708c3f4471e606
-
Filesize
6KB
MD58e602e02bd31140a73f957fea5bc4e7a
SHA1a47fb8c5a0a69cf1aa0227e0d1f6ab1fe709b69a
SHA256cff19fbd7e8a6322d436d44f8caca1e73592cd434eac78eea043054256fdd013
SHA512ff88aac0b41c770e80a081abf8a981eb6acfc1c3d0873ab80c9ebb65b8934a8b9fdd71c997be72b88a994a668d3aeeaec75ec083a351f1f354380434493856d1
-
Filesize
8KB
MD536db45f33a97bc7fad563e55405517a3
SHA15a964e4e91e5ffed6ff78360d87bf1caf70005e6
SHA2563c76bb3d85df37a057d42bd6759e5da1b4430e36fdd8a389e696611be81725a1
SHA5122f42fc187de48eac701636ff12ccb3a73162c68dccf311a6f45251e2b5957d8added740c7fd766a067eb898e13317a27b3da2d37dbf261784f6adbeecf16f2c1
-
Filesize
8KB
MD59f4ec8da6d22b2dd4e9c50dab52b4552
SHA131863b3c741ab283d1a821c25a4ffcc33a23f72b
SHA256dc67ab0f3d26022a6fa8a0947b920b45d56f545006b637e585e7c2afe503fc35
SHA512ee001ba46ba68cdcb2f5c4b621489bb399ac837ecc62d692acbae35f2bacb50df24b3615f4c1b1ad59efc39f6c535dfd3e55f72601cd22d52ab8eba4b41d111c
-
Filesize
8KB
MD52747944d293f1216dc69473be716d2ac
SHA12215d14bf5657ce84b7e184046d597c6561d0094
SHA256a71733854bad88a5f35b995e8435c47aa36dcc4e41d772edd4b234bcbb67eee9
SHA512508b69c4353292b81ed8cc32842b465724a9d6a0132ab71d9ac770e113714dd5f8edcec10559dcd64eaa763e360265aca0a38c35b202f6f7cc852c076c269d20
-
Filesize
9KB
MD5708446823ee0b964cd1faff5602b4857
SHA1d7931bec93363c1ae8baa22dfb9530ad8bd416cd
SHA256eb9554379570902e81f804889cbb8cc636bc344119cae1e2183341d2af23a320
SHA5125ed624f23cecf72116f49403fc70b4a7c851125e55fd645523c22c348e861538f300dfb33c7978895fde2ae50010e173bb2894ee5a73db311abeb40e688171df
-
Filesize
87KB
MD5bfa1ebf7227805277695b7e09c058a70
SHA100e7b85d6b31c682e65f5cfb62272f72c1c567a9
SHA2564f05229d65d082fc37177e16b81eaad7c454879396fc8ea3430c602847eed4a7
SHA512af14ac72eead21ff572e4f7e006814d0e0b6876406e8b5ddf816bf2cf5042eb1439faf00cf05833c0ea5c53fe03ae3d81e8b80767e444cbfffd0a2ca4020d7fb
-
Filesize
87KB
MD5e10f7912b4cb30de13431fd011cf1807
SHA147797b6e6fca0c3618910c3fb1bab3db2cebd755
SHA256b37f18d75435f95df50f6a5153fdf3a826119d816446f193dc25264e7cf137c1
SHA512b70d3c810e1183bd9e482b61343c1edac8b5b9a483a64c942731ba9ec797a1bb5fa8f0a56bd66933076b2c1e449861a01a195d8f66669bfbce0cd3ade1035b24
-
Filesize
110KB
MD5b9b7f2d5456966afb71755a5cecd959d
SHA1cbf7a80004b732897b0bb34fc4199d0bd8c5d78f
SHA2566ede2f78d86770e13d8b31b3678044311a337ea9a4a502386df35a2199dd788a
SHA51206a8e894fdb166fb8dc08ab0505aafa580b16b50130d2fc01aa7c09f78296d1cab3949718b719093b330b946b3d45d07e5e5d6c1d4035f0872e76245f98ee87d
-
Filesize
107KB
MD56b7cbe727b3065a2561a345d89ee0013
SHA16b1b92d57ca3e43a37390d8d4b8cb3afcfe18b5b
SHA256d8def54292518a5fba7ca340508b1710c8ab13fcdb10857cecef712ce7f7854c
SHA512456189d0668f17bd86cdfcd452cdfabe05e252d07f987203385450ce11ebd9b10898dccb3401f7159a2b45de4db065cb2badaee9782e198858a247ba29590370
-
Filesize
101KB
MD56ce293114b92a08857f538f2bb2eaaa6
SHA15364048f5641a171a3f33ce2e940fbf65fc6e8fc
SHA256232e61424ecb5ef78df7ec43dddbb327e0f2b4dd863883298a396735f196129f
SHA5126358c14b8f82e3ddd3481ca41e549763c06fb949a0a25a7f5777b63e7ff7e3f3513b5b9afe5780f0ee29d0e1d304e559532c8a8c9650426ae7fc09b5d0b5f06a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd