Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2023 17:16
Static task
static1
Behavioral task
behavioral1
Sample
Vermeer.eml
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
email-html-2.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
email-plain-1.txt
Resource
win10v2004-20230915-en
General
-
Target
email-html-2.html
-
Size
34KB
-
MD5
2da3ebacbc19a475c98617961f3e518b
-
SHA1
6f3761ecb47e81ce4b27b94ab002936ede7758e4
-
SHA256
acfc7cb2841c636d5416b44559cbe65585689fda1feef35192b05ee96654388f
-
SHA512
80aca9b4b2a9fb8cc53b8db05ff0991a65c96c46a5577416b35810c66aa25b4a831f6cf87c0c84e7d1f80476345485ecf28dea014e6b610bbb3aa2881892b2b6
-
SSDEEP
192:cGHxCwrpwrfEoQTcKQ8y2pToKQsTgKQ/UzGO5gLt16fomSOokoroto/okofKQXU3:cGHxHrGrGgRJgRugRvgR9+j+km
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133409134069467853" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2890696111-2332180956-3312704074-1000\{C16390B0-2417-4341-96D7-3CD2ECE6B7ED} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3432 chrome.exe 3432 chrome.exe 4552 chrome.exe 4552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3432 wrote to memory of 4288 3432 chrome.exe 33 PID 3432 wrote to memory of 4288 3432 chrome.exe 33 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4940 3432 chrome.exe 89 PID 3432 wrote to memory of 4504 3432 chrome.exe 88 PID 3432 wrote to memory of 4504 3432 chrome.exe 88 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90 PID 3432 wrote to memory of 2700 3432 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab3179758,0x7ffab3179768,0x7ffab31797782⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:22⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4884 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3420 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2388 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4716 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5256 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5364 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5000 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵
- Modifies registry class
PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5644 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5848 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3352 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3296 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=6084 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4988 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=1792 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6028 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6052 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4884 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=5308 --field-trial-handle=1860,i,1819708963697470310,9182380543030558707,131072 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD53a1f93f31113af3544feccb5a483060f
SHA1df94925d3860655890b83f1f78d5c4ed58bd6cab
SHA2561bce82129a38587ea43ca5d82daf910d5d8c54d339d0d8ef55db0c5b879d941e
SHA5125e96a8b2bd71cb52be2e036cd812735bd0aa679d404276dfd6ba3766a0d7adfc1a4ad7ed1373061213818d7d263531f9ae87241d782234388d9748d532c8e4fe
-
Filesize
60KB
MD5bb0ddb8e41a836512cfa8907d8a244a9
SHA13ce9a2fcfd4f0c4bcbad253f24136270863e44f5
SHA256dad162fd82cd63923f51851c50fd800e5cf43be607aa57e866c5ac7e092c701e
SHA51274fd5fa186365eeb4307398e85fcc24d459eccb5a7ec9bcd52132f4c1d2a0f93e95d38cf5c380c2f01af6279a71b6d6adcce5b6e1c147a49c6f44993b93adb57
-
Filesize
24KB
MD572c83c9ccb68474b90e20ef1e0f38e72
SHA1123b95b15ccef3190b0717b244fe12d14eca8b1a
SHA2566290f8ca4d1c39ac4e06fa63f6dd4c50a8de9b711d6f4457d92c13d7311d6b35
SHA512fa779aed74e78dc8895d9e3bb554e4cbcb326e21c0febd41d0da32e9b6248bc5cb844b37c1dbe7432d0054d233e7ec7315ee36c76c561ebb88774bd2e6735a22
-
Filesize
78KB
MD58e1ed89b6ccb8ce41faf5cb672677105
SHA19b592048b9062b00f0b2dd782d70a95b7dc69b83
SHA2566b555920e358f8a25a422988b448615c33bcccb4f932e8331cebfc8e2a737fc7
SHA512e2f6b4574cb1541dff6852d0af44faae80286110e8451841eade4b53ebdf31150602640fe1bdfff41459ea4ae884d14d115fbc93b30d199c87b88f5d07e4cd72
-
Filesize
96B
MD53bdf0282b804f1693ddd911d144b565d
SHA19131bb84c910a88be0d5e4a0cc3308dd46443015
SHA25661ed9a831969d921482f88b77a624e2ba55bfe88837702ca97ac415380c93c02
SHA512307ac808559d1e2d3025ab98f82755c4d33f4345acddff4021de738a5e44e279ea6e3884ea551431c562615add776861ee2df925f789e5ab7e11b5defda48293
-
Filesize
528B
MD5e4949c9d1041d91360bee4b6e8bde8fd
SHA1936c82de0fc49173e454ef359ce3291a8ca3becc
SHA25694ce814e1e44e54a90fafef5defe00ddd811b628d3f7d78d5ab6a6c3e85c9430
SHA512dd01507ae00e677bc0937744f49f281e86b35a7f1a977b34226e93db6d028ab5a969c5f07abeb5fb36bc9a2062d04e1d531e89cb434df6862c2618244fed0758
-
Filesize
552B
MD541b859ba5839f5e0f48a170dc7cace28
SHA15c344506bc444db181e495831a9abff8d272b93c
SHA256ec8efa0d3d14e7db6004262c4b65008808ef71af864a4f032bda73a157c005bd
SHA512149c2b957d8d27630e0992cffe9e9b3fb4498f8bcafdfcab90fb70a5c0be7c98cabe5398f77359cb91faa673ca26c59bbe6cfe60d899fcb02c762de8bd8b488f
-
Filesize
576B
MD541cf44d1d45aece819e3721c4227f200
SHA1914535af9297507748714ec452dbe8b61fd7fe4f
SHA25676a9af41e569912412ee43e385a834dfbfaa4c50c2e33efabfd9fe5e752f0aee
SHA512b4f8c1e51a763e3eba14377f8b804d2d97b3b22a62889c9bac6c80908eec388a3130367a48bf22dfd4350cc4d6d18909d6cfba706610c32736bc1027c5907024
-
Filesize
4KB
MD5521ce28c53ae2479894ea5bc64811e01
SHA1d49556a660cde0d80d5fcfa3a76f45e962f6857b
SHA256f6f45eec829c543ec4de24bc1f36dd771f58198d06df55cf23c6c39590faf973
SHA512f537cdd868a7779d5948afa4bc1d098d7a43f286d6d269a3e2a114ab13a4a67094d72966c11c6a13822aad9541934b96a07dc64530a467a8a7353663f9ad7221
-
Filesize
4KB
MD5182cf48b21a0744224eb5ee903cdbcf9
SHA15677deee6cb3d6c92a912406bb188b855385ae9d
SHA256d31bb1ad17a9483283d8399b01492fdbe44de076077fb894664cc3e40566b20b
SHA51260a01cd4b99303453c05dcba4f7a891630a13cfdffa67300d914ebb238ec55f63598a9f0133d91ab51b9a5239616b4a878283522c11418912f035e57916565b0
-
Filesize
4KB
MD576c532d8aa57b7e6722d48ef5990ba6d
SHA1065309366d2a883160a73b6d6b69450370f13ac3
SHA2569a4aef626c0a3bc7bda8aa327cb0725d5373fe66b8ef5754bdc2d12281ffa95d
SHA512a3f64a343ef36a75e1a882a5295a05bad75989d98b7d9d203ddd143c9b3b605d535dbbcf9425bad03f83ee6e4887200ed806caa3556783c58e4dfedb060a8f87
-
Filesize
538B
MD5cf74b2c18964313cbad8ff65da99e318
SHA162c21806c281d992b4f6bbd9e550707492be7997
SHA256974088f10efadfa40937becdaf91dce149a221e354b5dd272f1f0285ff706741
SHA512b709cad3134cbe5ebfb78f0b48f1a0f5d04b3725d13b00a3d5914ac210aa233e291a6f6c843327072cb089bc23e6a61989865992b62194d4ae08ccdcf2ae36a7
-
Filesize
1KB
MD5757bf6438891f96ffa185c7f485e9374
SHA10523e18f15a5564d8726e39dbbf474202ff5c7bd
SHA256c792090db25e42d1a4592c3593d236034a215abb435c16a6bf062a2b9ea3c598
SHA51231d6152e532691415499fe01b7ab2128d8613c36e7acbbb2c83cc6f7bcf4a36067df7d2a8e3e7ab7fc43c1d7303ee4855e6dcb2b05827a71edf2c3907ed1a023
-
Filesize
1KB
MD54335d27ec678004013415c155676d32f
SHA136a8219d722cdf68ebe8b717b1ff40e0685c3b4b
SHA256caaa297df271dcb22141d20852c1bac795c70634af9b4aea90be111f8025d363
SHA51291f976f96834cb561ce0e53ba4b37b3b379613155c30f95e5df5bf2cefa3ee41551d7c71c266e72d05d5d52b41fa137d529744850d3b09770fe5206fc89fa925
-
Filesize
1KB
MD5e983f332f9e893f1623eaee7a003d69c
SHA12c7d77ca4ead090e8f067830d6e92704aad3af64
SHA2568e2dd76304ce8269cf17bdc4292c5e747e657052b9343c9da00cb086442c9c7f
SHA5121cdd08fb851d6a0d44514b6539ab9258d6c4bc18b6d621c4ac4bf78c6f8188b540203f2cdfb3cf308dfa4d1b75e93624cb30acdc275700c63831477d2c82b687
-
Filesize
1KB
MD50a1f9ab11f4752ee7fbbad32a0010b93
SHA121270139432b99faf19e0517fcb89b625212e389
SHA256c5fdf7663bde9eaed50e19135fd55bab52aef8060829ba677cb6aeee0620015b
SHA512838a5360a9d1835d8c5ca734e96be3a9b201a1ccefe0dda8c832e90df238e11c3a17f9d6b364d488a46a5a2fde469a8ec0af10cc5a19d14fef2877c19144c901
-
Filesize
1KB
MD541383d2e18a7ce3eaeed41817c3deef9
SHA13f2fcc03fedd735683043c4288dc3086cac37c98
SHA2561b31412e16c8336ebf9ee220dce0dc7b26b4490580b2291daebbf1234d9408be
SHA5127d59ea9d3b283e72aac55df218eb705452b3ece5d7564034f4be1f31e3bee178537a411007128cd98904493ea65e4cffb08fe50bd55c05bbffb5279da4227c63
-
Filesize
1KB
MD538bd6c8eef575caaee0f5de49595b0a1
SHA1c740e6378eebd170c6df9c73c77849c8b9524d52
SHA256759dc20ef8fe4b86d9a7b08d8f133f544dc784f3074440220819d255b71523cd
SHA5125b2905440662b176f3b747c80b2386282d4f92be5eca4e824330ce8d511c721ae7683f0772094ed736b305b587423add22a8eeba80daf932d20fe60fcb66d2dc
-
Filesize
6KB
MD591520107e3700f3b95606bb3872c77f0
SHA1e13943c29ab020b2aed551c4e3752fc0e2cf0558
SHA256a00335fefb1f0f2989802362350f0df1eb8b9c8bf255436a0a2be61c44a0b136
SHA51216e6fa57dc37cb3d01a996e3f6c82331e0d9f87b5a95bfe308423dd380ce69b5f6e428dfaaecbe3e050f831e2f18dac4b1d0eaddb27da9f98a47d984af91a170
-
Filesize
7KB
MD554d8cd92402b3e4165e3d39e44a1061f
SHA127f95ab3a67e104b2963ab9def836e3bc611d627
SHA25667b36d0541562f5dc2f853865b2dcddf078b2619542c3c2463c878b47e29772a
SHA5121e5c9b22408fecb01e8521172bf6dbd8e92db14f219dafa3a423ffe9b7798d2d6aab9534e823a8b8f773d74f2f05dba4e00cdef1d6bbb7c4f1815e929ae3d28d
-
Filesize
6KB
MD5f25bdf0c731e5653f069f1574e73ce72
SHA1cd2abde3ef7aa6b82c66f5061b1f1c6cf42d08ea
SHA256db205d259d787fac836c1ef13393e316ed8e85fa5f619983437e4291283a8d3d
SHA512da1a5031a503d52bed288583cee6eaa4c9a871cd8efc706e3773c40e137c70bd291dfc4d20493338dffbb2dbd9e48729fdb8aa2d7790a6e31d9dc5e6c0d233c5
-
Filesize
6KB
MD55651dae02c44c630d4f7e2d356873178
SHA1ea6b00f9ffc610e7235cf64a94aa0ec22933fccc
SHA2567e6274baee52268e0dbd4ecb684e25a8dc184a7f8dbaf2ae3c9e73f11de400fe
SHA51218e878a651308563679756f72775b54b4d9b3af4f4097fa0eb598b15d7e2f85704991c2c30f18515480585f1c9658ebf26618aef9017360565ed9735051f642b
-
Filesize
7KB
MD55c224f0d45251259fb83d6ee844a1520
SHA179895ca8d820905c6dd4016951c29803d04e5d0b
SHA2569df92d3154ba46ba36dfb50387e4e7da0935485882348d7220100036073d9e4c
SHA5125841df4e3505a7a49f89c8a37a84ac558e0970e4d970685c0f747ce33ffb31e8d260368635a4cfb9c362927c3bc50d32daf852c874c348f2dfb5fffcd303d600
-
Filesize
6KB
MD57ae6906b998cd46bdfd8032c6d3632a3
SHA1c6810b019b3dfde89922d955cec58d78f1d6e3a1
SHA256a0164ee9762378f3b5baf2d1e83f8cc3f82206177bc89ab215008a0b5f8c28cf
SHA512efd25f5aebf42d3264aea708a4c7b6ad03ec9fd0148def2b3ecd937556230f18f8b237e0d2675fea780c167c42d4c864cc44cd77f9b42a44e4ae6cb3b32fcf06
-
Filesize
7KB
MD506c185f34a2c7594bef87c67d23b13be
SHA149fd05083fd50ad66b49fb9c37aacf7ce85dbf28
SHA256d30cfda2a0758d8bd4794631c0d87e5d2b30cd9de91baf28b0d009f17c793737
SHA5128ac4c627a81d75abc34c7e0249167ffb33fa950c1158af8bcb7b80c085036da9c295cb72fcc796fe06e4fed9eaa60ff4e3f24c0b51237605d0d3ce7e2bc81477
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe581ad6.TMP
Filesize120B
MD5aca3b5d778588cbe6f47271ec721a137
SHA157a422eca652b0ae4f7900328526b3d6934a45dd
SHA256af263187f934877b960ba7b29c1f9f1c804fdee5a29a20976e7a992d8c833967
SHA512d2cf70a1467bc1a819e8435392f3d95d2fc7acaab7079094aa68c268b6a7912c66096b12cf98d49760de5e51a7d52ff4d6752ae58164400649d6d11f08d46b65
-
Filesize
101KB
MD5c75ddfd346eaf9c82bcae80509c0cfa5
SHA10eacbc128d877076e2d3a369d220e9491ffdde47
SHA256111b0208681ed49aa5e54afa2975652d009781dadc86114ab343a19c0f20b264
SHA512389920003f842b3817f6340f51bbda056361e5cfa50aa423d0640151cc97d889b0b21949e022d4b9de769a38455227680c8093e00a226fe0171398d3cd6f3820
-
Filesize
101KB
MD579e6ac5550d05820e79f6024b08f5eee
SHA1571bfd0a4d40212bfc0aa27c2772e086c886a1dd
SHA256d5dc42f936f62a5707a88e3234a82783154f43ebd1264ddc65e69c4672b50f8c
SHA512b93ec0f790d0643409e102bfa69215eea7f86a08ce150c939ba2ecbdc83e118f58c0f86729e211309b7d38acb5e544e99bc86aa1907adf9554002cea02156050
-
Filesize
101KB
MD58127fa03e2cea8412b824584f3864431
SHA129f69bddbe537d01ff8927a7eb98a6d94799177c
SHA25621bbc04e093aa22b07636c7da93e7bceb43b25d1da4c5590b7b68fa4669b9a67
SHA51264c5124b5364967aef467654c3ebdcf3ad1dce863e91a32c8c7ea368624d80d255ec4c1c3b54a2105d9a9a100e9270d7e369bcf88381d21329da34fb20f09b55
-
Filesize
99KB
MD54161fd25989938dc6135606fdb66086f
SHA1724a33c69b79b56179bafd5ca97141c5f8e71c45
SHA25650966189df5b356aa4b784e401951890b23cd3694a37132e063ec526430d0708
SHA5123f69ba6ebcfc19830f62e0a6930c502c24e2172c5ffdd8dc39ed9d27f858784f61fdbbcc266a66a48300b6177b1993380ea38d0e9c1e347105f43534a8c5c9b1
-
Filesize
97KB
MD510077e81afb7e450931a0dfcec12b26c
SHA1abe8c6b385d540a9586ba49f7fedab395a911f1d
SHA256d83428221541f7385d87efe24568ebaad7fba37aaf35be54f98c7eb8d3ed409c
SHA512d31bb3f7c062fe324b88fa776293b60fc15e372b5a0fd3405d4c95ab9720cf3f1e9a7d1bbb7cbfa99ece40ca46e9ff7a727583a7fc7b6eccddecddbcd4a71dad
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84