Analysis
-
max time kernel
311s -
max time network
313s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-01-2024 11:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://buqkrzbrucz.com?r=dir&zoneid=1963280&pb=948705d096df7391785f960aa73567581699661348&psp=mjiglazy2gv_ucc3oaygtvlvafoqzree4df_4teuvgc3-qhnjdn17w7_rqjhx_gyjja_huhgzykpxlwe5p8r8cjmsuo_w6xcdxqxj8cyjqb-wmidlvn7umewiem4cmmy-5yjsjmgdnplyaovggc9nd2f_py4c8yahevtciiydryakprrwob_zyvhlckqujqgm00tmbn6e0uimlpo2syjs1brmh8ekqnx9cue6owwuscrded_oxdb1jckykx41podi-mdpbq9zcjdzhiuzjjcou_bvy2utdluuei4ik_j5zmjhnr-plozop1krcmgw2mdsqfr6kgv7e6eqomrh9zm_jh5s4z2tk8_dgj_8qnudt_oyq_bxh63inea_ppgikwgrwhbgepmqxykhs8efrympn6tfigdbhzyjtq8vuxb3jifgo5mz_syxmq1-hxw7k6b4dvfklvm8g6_rlzqgbipcn0cnjkw2y0f8-oogwgohvthmejnx7ooscoqrq-czdfatr6stps2khdppfwopm7q82l55fvho45f1q-toitzbseayaiwgef2puahdym77jnlh7tgay6pc5votee1d91-0ajiriu2s4omzqw3kggotuljzodthvqhudwsa0mvvesvr4ndbnnfk3oxkxuwzncsvsybj1qgpgvkd5tiac-woqsohtws_fprjbohuni_k7mobjtofi1b6a3vfmqc-u1f2mhwx16wpuu2wlri65ea94md_ogdzxic4mky5g84s69nnegxvcfbjnmep9ferrxgljswbjlfzppxlycl8y4staqbrr845t8uvxiqkvaz9ayp_3uc0fonxaba1heckufs_xd7lwuiht5e8fsnnltv4gmsw98qed3wwz7wybk26-uzgfb75ilhz3wsjdworwyk0tc6ao2bvyxwtnb25sgcd2ix27ggstfmr6wtqpm8hrpdelxmc_w5s7k27t6-hawhcu5gl3z7q5erngl_roycg2bfmmqpapkvyxijrcd9jjir4de4ptqk8nxzow_b&fdl=1&nojs=0&abvar=0&febuild=1.0.175&t=0&wcks=1&wgl=1&cnvs=1&os=-60&ss=1&ls=1&bb=0&plu=pdf%20viewer::chrome%20pdf%20viewer::chromium%20pdf%20viewer::microsoft%20edge%20pdf%20viewer::webkit%20built-in%20pdf&lang=fr&pf=win32&cd=24&ix=0&x=1872&y=966&md=0&afid=3770563231538176&eclog=0&sp=0&im=0&cha=x86&chb=64&chbr=%22microsoft%20edge%22;v=%22119%22,%20%22chromium%22;v=%22119%22,%20%22not?a_brand%22;v=%2224%22&chf=%22microsoft%20edge%22;v=%22119.0.2151.44%22,%20%22chromium%22;v=%22119.0.6045.105%22,%20%22not?a_brand%22;v=%2224.0.0.0%22&chm=false&chmd=&chp=windows&chv=10.0.0&pload=160&rlp=[0,0,41.299999999813735,23.700000000186265,2.3999999994412065,108.59999999962747,37,23.299999999813735]
Resource
win11-20231215-en
General
-
Target
https://buqkrzbrucz.com?r=dir&zoneid=1963280&pb=948705d096df7391785f960aa73567581699661348&psp=mjiglazy2gv_ucc3oaygtvlvafoqzree4df_4teuvgc3-qhnjdn17w7_rqjhx_gyjja_huhgzykpxlwe5p8r8cjmsuo_w6xcdxqxj8cyjqb-wmidlvn7umewiem4cmmy-5yjsjmgdnplyaovggc9nd2f_py4c8yahevtciiydryakprrwob_zyvhlckqujqgm00tmbn6e0uimlpo2syjs1brmh8ekqnx9cue6owwuscrded_oxdb1jckykx41podi-mdpbq9zcjdzhiuzjjcou_bvy2utdluuei4ik_j5zmjhnr-plozop1krcmgw2mdsqfr6kgv7e6eqomrh9zm_jh5s4z2tk8_dgj_8qnudt_oyq_bxh63inea_ppgikwgrwhbgepmqxykhs8efrympn6tfigdbhzyjtq8vuxb3jifgo5mz_syxmq1-hxw7k6b4dvfklvm8g6_rlzqgbipcn0cnjkw2y0f8-oogwgohvthmejnx7ooscoqrq-czdfatr6stps2khdppfwopm7q82l55fvho45f1q-toitzbseayaiwgef2puahdym77jnlh7tgay6pc5votee1d91-0ajiriu2s4omzqw3kggotuljzodthvqhudwsa0mvvesvr4ndbnnfk3oxkxuwzncsvsybj1qgpgvkd5tiac-woqsohtws_fprjbohuni_k7mobjtofi1b6a3vfmqc-u1f2mhwx16wpuu2wlri65ea94md_ogdzxic4mky5g84s69nnegxvcfbjnmep9ferrxgljswbjlfzppxlycl8y4staqbrr845t8uvxiqkvaz9ayp_3uc0fonxaba1heckufs_xd7lwuiht5e8fsnnltv4gmsw98qed3wwz7wybk26-uzgfb75ilhz3wsjdworwyk0tc6ao2bvyxwtnb25sgcd2ix27ggstfmr6wtqpm8hrpdelxmc_w5s7k27t6-hawhcu5gl3z7q5erngl_roycg2bfmmqpapkvyxijrcd9jjir4de4ptqk8nxzow_b&fdl=1&nojs=0&abvar=0&febuild=1.0.175&t=0&wcks=1&wgl=1&cnvs=1&os=-60&ss=1&ls=1&bb=0&plu=pdf%20viewer::chrome%20pdf%20viewer::chromium%20pdf%20viewer::microsoft%20edge%20pdf%20viewer::webkit%20built-in%20pdf&lang=fr&pf=win32&cd=24&ix=0&x=1872&y=966&md=0&afid=3770563231538176&eclog=0&sp=0&im=0&cha=x86&chb=64&chbr=%22microsoft%20edge%22;v=%22119%22,%20%22chromium%22;v=%22119%22,%20%22not?a_brand%22;v=%2224%22&chf=%22microsoft%20edge%22;v=%22119.0.2151.44%22,%20%22chromium%22;v=%22119.0.6045.105%22,%20%22not?a_brand%22;v=%2224.0.0.0%22&chm=false&chmd=&chp=windows&chv=10.0.0&pload=160&rlp=[0,0,41.299999999813735,23.700000000186265,2.3999999994412065,108.59999999962747,37,23.299999999813735]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133487549385471507" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2428 chrome.exe 2428 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2428 chrome.exe 2428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1552 2428 chrome.exe 79 PID 2428 wrote to memory of 1552 2428 chrome.exe 79 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1944 2428 chrome.exe 86 PID 2428 wrote to memory of 1744 2428 chrome.exe 82 PID 2428 wrote to memory of 1744 2428 chrome.exe 82 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81 PID 2428 wrote to memory of 3036 2428 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://buqkrzbrucz.com?r=dir&zoneid=1963280&pb=948705d096df7391785f960aa73567581699661348&psp=mjiglazy2gv_ucc3oaygtvlvafoqzree4df_4teuvgc3-qhnjdn17w7_rqjhx_gyjja_huhgzykpxlwe5p8r8cjmsuo_w6xcdxqxj8cyjqb-wmidlvn7umewiem4cmmy-5yjsjmgdnplyaovggc9nd2f_py4c8yahevtciiydryakprrwob_zyvhlckqujqgm00tmbn6e0uimlpo2syjs1brmh8ekqnx9cue6owwuscrded_oxdb1jckykx41podi-mdpbq9zcjdzhiuzjjcou_bvy2utdluuei4ik_j5zmjhnr-plozop1krcmgw2mdsqfr6kgv7e6eqomrh9zm_jh5s4z2tk8_dgj_8qnudt_oyq_bxh63inea_ppgikwgrwhbgepmqxykhs8efrympn6tfigdbhzyjtq8vuxb3jifgo5mz_syxmq1-hxw7k6b4dvfklvm8g6_rlzqgbipcn0cnjkw2y0f8-oogwgohvthmejnx7ooscoqrq-czdfatr6stps2khdppfwopm7q82l55fvho45f1q-toitzbseayaiwgef2puahdym77jnlh7tgay6pc5votee1d91-0ajiriu2s4omzqw3kggotuljzodthvqhudwsa0mvvesvr4ndbnnfk3oxkxuwzncsvsybj1qgpgvkd5tiac-woqsohtws_fprjbohuni_k7mobjtofi1b6a3vfmqc-u1f2mhwx16wpuu2wlri65ea94md_ogdzxic4mky5g84s69nnegxvcfbjnmep9ferrxgljswbjlfzppxlycl8y4staqbrr845t8uvxiqkvaz9ayp_3uc0fonxaba1heckufs_xd7lwuiht5e8fsnnltv4gmsw98qed3wwz7wybk26-uzgfb75ilhz3wsjdworwyk0tc6ao2bvyxwtnb25sgcd2ix27ggstfmr6wtqpm8hrpdelxmc_w5s7k27t6-hawhcu5gl3z7q5erngl_roycg2bfmmqpapkvyxijrcd9jjir4de4ptqk8nxzow_b&fdl=1&nojs=0&abvar=0&febuild=1.0.175&t=0&wcks=1&wgl=1&cnvs=1&os=-60&ss=1&ls=1&bb=0&plu=pdf%20viewer::chrome%20pdf%20viewer::chromium%20pdf%20viewer::microsoft%20edge%20pdf%20viewer::webkit%20built-in%20pdf&lang=fr&pf=win32&cd=24&ix=0&x=1872&y=966&md=0&afid=3770563231538176&eclog=0&sp=0&im=0&cha=x86&chb=64&chbr=%22microsoft%20edge%22;v=%22119%22,%20%22chromium%22;v=%22119%22,%20%22not?a_brand%22;v=%2224%22&chf=%22microsoft%20edge%22;v=%22119.0.2151.44%22,%20%22chromium%22;v=%22119.0.6045.105%22,%20%22not?a_brand%22;v=%2224.0.0.0%22&chm=false&chmd=&chp=windows&chv=10.0.0&pload=160&rlp=[0,0,41.299999999813735,23.700000000186265,2.3999999994412065,108.59999999962747,37,23.299999999813735]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa78479758,0x7ffa78479768,0x7ffa784797782⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:12⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:22⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:82⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5144 --field-trial-handle=1804,i,8031241186391298648,3032633197410951492,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5b15f87adb8cb628e2305166c9c785f8c
SHA10c76b9abebaa961caf6802ebdfc84e90b0fa391c
SHA256c4093ac839e8a4040856fcfa8cc18513573babc76c60031d7ac20eed43568588
SHA5127f57975d910e3aff9ef22d2ab6d2473fa5264b65a7fdd6f3bb5eb21cbf0418caaee847a1a3f63702783b3b74d8cefed26b30449716c5004574ee5042a27cd5e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\129aa492-011d-4a64-84bf-388dc3ddc4a2.tmp
Filesize6KB
MD506aa92511ed421f0ec04e669d27d8a18
SHA150d9fd8dd8b5a580c4f63e7bb21773b666112126
SHA256fe735e40860521cce13f28bdf5f1bf48ad1340f5cb3f5ecc0e80c9730d4e3c62
SHA5120a8766f257b27cbed0633fd4fcc087a46b43d2cd2e102b7670fbc8fda54ec97aa119f9ea645cddf586cc6580786b451474f6d3398a8ad9eed41c5ffd06c76171
-
Filesize
1KB
MD55711df610c7a1b5d42fcb2af25804ecc
SHA13466cec2e1dcc374639fd46cbbc5b6c29a7ffe48
SHA256524c14df27a13757501b196ecee728fcee51a90c5fade0d4e196cfe90173733e
SHA5120fdb4cbc0d3d2ade38a8e9305bbb4d6caba612781b860f4420fb192d943e39ea4fa45b76d5a62da286d8091e8a4f21cef98d27e514ac5e6f819bd7752fc8d3b1
-
Filesize
1KB
MD50aea1b1111c47acff0868fbe72b6abd9
SHA129348881dc398ce29eb50f5bb0174b402991c97b
SHA25618d6053190d8ada02c6bd9509a05c8631fa2617351005a9bc1518791a1c69cc2
SHA512476bf23ccdc47e28a10de55809f35b8aa9d77fe6b7d8133dbacfa56f58033dab7b97c58b1ded535b8f12bbf38880178f9674846255de64a4aac4cee09f9100ec
-
Filesize
6KB
MD5b1dfd7d9365d5b69d2e4fc38da57ba2c
SHA119e1a5ea4ee9e1570103f8f34f81faad39656547
SHA256109224d968a8f7563619b0c9abc78339b801ec67cbeb0a401d52207e503133bc
SHA51275464b262900459f48846c89457b010dabfc204cc6f118f5ec10e1b1bf01b938fdbb668ce565dcb1733ad2c3a65a2951a0165508ffb6bfb7c91f1d2876bdc47d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd