Analysis
-
max time kernel
417s -
max time network
429s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 19:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kinderrozenkrans.org/thdje
Resource
win10v2004-20230915-en
General
-
Target
http://kinderrozenkrans.org/thdje
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133415265935332558" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 3728 4964 chrome.exe 83 PID 4964 wrote to memory of 3728 4964 chrome.exe 83 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 3580 4964 chrome.exe 87 PID 4964 wrote to memory of 4988 4964 chrome.exe 88 PID 4964 wrote to memory of 4988 4964 chrome.exe 88 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89 PID 4964 wrote to memory of 1532 4964 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://kinderrozenkrans.org/thdje1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5b0f9758,0x7ffe5b0f9768,0x7ffe5b0f97782⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:22⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2808 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2800 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3648 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5488 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3016 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5484 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5716 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5500 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5040 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5308 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5768 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=984 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5740 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5444 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4544 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4616 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3832 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5840 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=4672 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:12⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1604 --field-trial-handle=1872,i,5965568991197562398,993647307856112049,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1280
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57019f0007add36f36e0dc0ad360ee4b6
SHA126e0ec64d0ecf251a9a611a6c3cc01a7f612c6f8
SHA256278e89bfd8c5cc0ce7563fabb86e033e64b3bec07358422197684ad5033f41bc
SHA5122af69169caf9ae457f82956edb46db0630907d414c2a69ff72ea5f383d5fc613c8ecdec5a13e59bcf0a65d3d6ffd2c7353903481f0d659aa1344fb97bf34303e
-
Filesize
701B
MD592fa6202a39c98f0a23a88df84308f6e
SHA13dd79f4b1b96d30cc75a77bee6e2fba2a0f960ac
SHA2560c83ea50635923c9d393830f39fc1a236f1b4015362d253325379a7da090e803
SHA5122aacd194a7af40511641912badeffdedb9edd859bd3532eeb0f0178c90d4da1b019983b540b5d79a5a1b1963d5cc90c6d0258675f64991e74db9e4b30d538595
-
Filesize
6KB
MD5c0ffe26df77762ab1b71b109a9f4527b
SHA144e99ad016a432ab944cf257f959fc2676e4929d
SHA256ef3c02f050d5fc1fb513abd6b2a31bed7f95f3ecf96687b01751fd40b18a294a
SHA5122f3d2bf5c65e610c1901beea8453c5b53cf84d3eea5cc8ef36c751cf46e06da39106ece0dfd994b58d8a0f5298c189f1be5025bb6596ef7822cec0c3becdd7d1
-
Filesize
7KB
MD5e74047361ac9057034ee178121fcf98a
SHA1a73dd7be68b8ff5c7d882bc5ac90cdeeec116aa5
SHA256a55d547012422c790176f3758d4343eeede4652351bf920ed3bf84b3ea51ac1f
SHA5120d59f55b8f932e7a4230d4b68ef65929ab851e3d1257110d537adde9500031d0eb2e86b1bf128e898453c41820301bf64ff306a0d7f99e04b77098d96357ac62
-
Filesize
7KB
MD5e8b98c5d58d7ee8c7b9ab36b7fcd4883
SHA17d9e49bec385ea34695e39ed9f81243b1ad7ba68
SHA25637eee5d8eb2075b8f60f08f651007228d963ece44a476f3df1741eea70dc266c
SHA512d57fcd266fc5383194b727e13b9c31fbe6aa265ae3eb9a95f223f6c2cf60eb4e20b3eae9d8d6c396ebd65f2237a4717db121ff2954f100d43aa5ba0c22ebc6ae
-
Filesize
7KB
MD5c1c113174a90bfa8dc8034b11cd42d14
SHA1f589ae3642fd513e37df79bd841c75ff322aac63
SHA256de6cbe734a91fb618644ea70a47285cc0f0533e8df9a4c1c3202d194870ff48a
SHA5126558e554e544ac34a69bdf02300b89d10fa55b3eedefb7794d6349f3b32a06a8475b7a713ad75cad7b399cef95818c01e08780535c22da990f5e63e34b64cde9
-
Filesize
6KB
MD51cce801f11e96e11bdda29fa08a5bc17
SHA1cf33fa08fa6e5d144d3db229f9cd9ad97a8e5177
SHA256d2ac2065789c8157a72ab4db8cb8e675aa22aa85cc7462623dba7b23258e3c88
SHA512f996f8cabadad3e61c77703b4075cf9fed035e2a9f5b6c466935939e3f50c33379807a9183f950d8fc9f3c82beb1b54ae4a915be2c3cc52a61a36e2dfe02532b
-
Filesize
101KB
MD5a48a853cc22f4a335a9a5b4ebee6d859
SHA13e0dc0494dfa5452cefaea979c14758a003b6573
SHA256f215944704275ff7e85e7ff53a9ef3d64f88cc3688321d19d3ac7464fcfde2f8
SHA512184dde8fc204392f3948ef6caf4be567344766564048b40c0f5491322f5447e5e284ee280f06cc93e91cbc301c02623908be3cc4fd155f534526795321b0ee2a
-
Filesize
101KB
MD5cde513abcc7f1f5736a294a0b1921347
SHA1603aa26bddbc66a09e2368407c22b00ffa41b386
SHA2565dac4bfadc112183c57ba45fbb4f42ec24e6c86f8473147e0c773a97e633ae25
SHA5127bd08bf2bb6a79ec50de4e4104437fdff506522b7c13028a1e305337288f52afdd76ee2282207ff07d1a6531829adfdca09dcfe37c10b204389f5aa51b4666e7
-
Filesize
101KB
MD574040d6f961c80f02eee00e234bcb032
SHA17fba1b1e35f14c318173d2524b2f74e661d00c96
SHA2563ed27716dfb536bfb8f8d1fa6cce10f21aa47f7a459cbd2ddf23726506366f5b
SHA5129d7ce38911632358135918220e1b65eb08d53919a690c0efb0a09fe343025a479927415ead974a52e0952df43af69be5d26fd60cbf69f4f76a34dad81a0ce263
-
Filesize
101KB
MD55d24d8429833cf318b3f3f60ffc62eed
SHA1b7f5747448a626e1b8412e8abde98a9293940f1c
SHA2567601f0b88153fca4d2f28606ef3395fa9d4baf97bcf61c3d637886e2635d6058
SHA512476392851057338473f820d4986d591159012147291e312ab07c868bf701f736419774f2c990b4111d1754d2da76a29a4f3cef51e567104abe92919e85788968
-
Filesize
101KB
MD52f9e3260a1226bb094e435c3d85f5eaa
SHA17e2a1d8e965e4fdc574cbcfe9daaf3359eb22e08
SHA256d3f2b7a0d092697718ca3fa636294ad00bcdf1423d01688278536906905ebd4a
SHA5123251246a3160e9bca5ee91f266e4b6e40ade66e3dccf1a2e86d5f362447d8afe93a3728390082d42143bd535e808bfb36160a51445c00f3733cfa1321aa715d6
-
Filesize
264KB
MD5ce535c15f009bc66b27cf24fbf5f82e9
SHA1e96c7151504aa26f1a17e2667846f0ad56883bbf
SHA2560b0910bca703211ddaf8e420ddf87c9a23ef09c76d0d92be42f6c2b8b7246a8b
SHA512f54c17131d436fa3588b17ab8eec75065c6076890f48de2f6a826b42a7e4e6dfdc346b8b34eb955e6e4113d2573b2072f114dd54f1c8536b87a6071cd012ee98
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2.1MB
MD5faf14c4dd0f77aa4e3c42399fb8d6a28
SHA148bfa9f37153e6b4bd302b4e1efd36c9b838c75e
SHA2563b600c17f9e31ca67836a48be6d01a2b3e71c39d245ce997e558b29ffec24000
SHA51236909953f019ea126494e5c609e0fb502c7844fe58a9780ddd7ee96a326b97624bdf0e3f7241d23ee86ac0ce8c0fb3991139fd246abde8c78789e229ea623972