Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-es -
resource tags
arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
12-01-2024 21:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url7923.marsello.io/ls/click?upn=Xn88PJeNIL29Y2OVpP6UixBZ7ycpu6uMyRMyggMM8I5BvFT0y-2F0zD8O-2BGXFPeYpQXzcS5rgA9mRxHiVq3kmwKg-3D-3DNJqX_zn392oq3WCbQR9pQOrSlN3JYr1eawUW29DwOmXQDFEKvXTscqRwDY-2FgKnWU8V7NzSsBCCcv9uzK4FKXWSalTgA6HlLAwSKlyolcXDeTD8LESmohCKVIVMRwikcFLJW0U-2F30bPooJOBZ0YcbQMn6-2FmnMiceXSiF-2Ficbf5zGdznNMV5HIgJ6Wvsgl5u5cCIA0IsN0XlstQmVYj-2BWfXc91eItGNHHE2mm-2B-2FZkm-2BY3Y0704POhl9n4NP-2F8cdMJ0qcZJIJFiWskOn-2Fxd60UeoT1nROgyCFawVPU0qlLGBI2Ckpch9EffXe3MfPR067bpNfcT6
Resource
win7-20231215-es
Behavioral task
behavioral2
Sample
https://url7923.marsello.io/ls/click?upn=Xn88PJeNIL29Y2OVpP6UixBZ7ycpu6uMyRMyggMM8I5BvFT0y-2F0zD8O-2BGXFPeYpQXzcS5rgA9mRxHiVq3kmwKg-3D-3DNJqX_zn392oq3WCbQR9pQOrSlN3JYr1eawUW29DwOmXQDFEKvXTscqRwDY-2FgKnWU8V7NzSsBCCcv9uzK4FKXWSalTgA6HlLAwSKlyolcXDeTD8LESmohCKVIVMRwikcFLJW0U-2F30bPooJOBZ0YcbQMn6-2FmnMiceXSiF-2Ficbf5zGdznNMV5HIgJ6Wvsgl5u5cCIA0IsN0XlstQmVYj-2BWfXc91eItGNHHE2mm-2B-2FZkm-2BY3Y0704POhl9n4NP-2F8cdMJ0qcZJIJFiWskOn-2Fxd60UeoT1nROgyCFawVPU0qlLGBI2Ckpch9EffXe3MfPR067bpNfcT6
Resource
win10v2004-20231215-es
General
-
Target
https://url7923.marsello.io/ls/click?upn=Xn88PJeNIL29Y2OVpP6UixBZ7ycpu6uMyRMyggMM8I5BvFT0y-2F0zD8O-2BGXFPeYpQXzcS5rgA9mRxHiVq3kmwKg-3D-3DNJqX_zn392oq3WCbQR9pQOrSlN3JYr1eawUW29DwOmXQDFEKvXTscqRwDY-2FgKnWU8V7NzSsBCCcv9uzK4FKXWSalTgA6HlLAwSKlyolcXDeTD8LESmohCKVIVMRwikcFLJW0U-2F30bPooJOBZ0YcbQMn6-2FmnMiceXSiF-2Ficbf5zGdznNMV5HIgJ6Wvsgl5u5cCIA0IsN0XlstQmVYj-2BWfXc91eItGNHHE2mm-2B-2FZkm-2BY3Y0704POhl9n4NP-2F8cdMJ0qcZJIJFiWskOn-2Fxd60UeoT1nROgyCFawVPU0qlLGBI2Ckpch9EffXe3MfPR067bpNfcT6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133495699901230775" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3676 chrome.exe 3676 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe Token: SeShutdownPrivilege 3676 chrome.exe Token: SeCreatePagefilePrivilege 3676 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe 3676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3676 wrote to memory of 3136 3676 chrome.exe 85 PID 3676 wrote to memory of 3136 3676 chrome.exe 85 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 1076 3676 chrome.exe 89 PID 3676 wrote to memory of 2488 3676 chrome.exe 90 PID 3676 wrote to memory of 2488 3676 chrome.exe 90 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91 PID 3676 wrote to memory of 5004 3676 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url7923.marsello.io/ls/click?upn=Xn88PJeNIL29Y2OVpP6UixBZ7ycpu6uMyRMyggMM8I5BvFT0y-2F0zD8O-2BGXFPeYpQXzcS5rgA9mRxHiVq3kmwKg-3D-3DNJqX_zn392oq3WCbQR9pQOrSlN3JYr1eawUW29DwOmXQDFEKvXTscqRwDY-2FgKnWU8V7NzSsBCCcv9uzK4FKXWSalTgA6HlLAwSKlyolcXDeTD8LESmohCKVIVMRwikcFLJW0U-2F30bPooJOBZ0YcbQMn6-2FmnMiceXSiF-2Ficbf5zGdznNMV5HIgJ6Wvsgl5u5cCIA0IsN0XlstQmVYj-2BWfXc91eItGNHHE2mm-2B-2FZkm-2BY3Y0704POhl9n4NP-2F8cdMJ0qcZJIJFiWskOn-2Fxd60UeoT1nROgyCFawVPU0qlLGBI2Ckpch9EffXe3MfPR067bpNfcT61⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd2669758,0x7ffbd2669768,0x7ffbd26697782⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:22⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:12⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:12⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4824 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:12⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4872 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5060 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3224 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3260 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:82⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:82⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5040 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4920 --field-trial-handle=1904,i,7581149134749967213,2833094246969480617,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5402cfaa361131a9b615e0f9ca721364c
SHA1425db58b9f0ca73f9582067a77e44ccb0f8aad3d
SHA2560be94b5b196fbb3e192ceaa8378521d7592fbaecb24b23833fe72c28fa99e3c9
SHA5127154bd07fa3fbf4f0afedff7666b875936f9056af9951bc1ab6f0c912f5f26fbd30390dec21b643df0694ffb0420be94ebe1b636afbb2700c4a904a4ced0101a
-
Filesize
192B
MD5754a98616e808ba81d8d67d86c180c15
SHA1c96bf2be629970f3e2eca938d2726fb75951ffb0
SHA2560fae3fa81dca5ee8cf6763cb92e5b027768fbe84aa5ab2ff9f19ec9368c57d43
SHA5127c3744243f0e1b2be1e99ddf467ea0594d79d0d9bd97b4bd7ad86e0c9a075ae98b6017cadbd2cc1736bfbbbfa5063e6d97450311468a21b042e2c68cdea792e3
-
Filesize
2KB
MD5ba6c11aa26ee039b5c5cb4d11ab349b3
SHA1502802f03eb44445e8d4600582b14519236bfab7
SHA2560b6f558e565003fad0d24a718264e3e2b0c880b575e143bfb0ef6036f6456124
SHA512b15102791868208b495b6c74d8665414ee38263ab79c8ac8db57b760ed6cb627b3045381e844a37925410c264730bb7f5bc8952979f44164c73658b31932d203
-
Filesize
6KB
MD535ba1a779820d00a913fecb40ba2afec
SHA1771db6660c47d9fa4e343390ef1b64ce3da4d233
SHA2562620f0d0e71e91d0f945ca548b038e6e707c74733d2af0ef7d992da5f1e67eb3
SHA5120e8b224419152f7e9f25802ab91c0312ab9782bcd34ba5fadc1fdf50cca37224abb54fe44df829b5ba79aa8bfebf88a6b20869dc509ee7ce9736de52ac0f02dd
-
Filesize
6KB
MD5b89f9c3372c1895e28be5d250d5ab017
SHA177c791d8a752d24714fd514ba89c47c435cb2b9d
SHA256ba7e767397946312e242116d097a88144e183701d0127f3354fe464a606df7a8
SHA512307b2e4310e7c7fb47d05bb71d7ab7036436319c507c71c6ab3f3f4ed5c07687d070fcf9bb968d14caa2e898ff846ac32b47abbecb1405cf25aade760a58dd53
-
Filesize
6KB
MD54508b297a35363ce6b1836d258d751ad
SHA1871c6e6349531c3d5e8ba22396fb1a0f5e3ac8c8
SHA25605f5ceb46cf86430305b70034723faba86d05362dd6487080fa0e225c3280bdd
SHA512cc1f79b9bd601ad7fb2013babcfb7ed0d241adcc74da36954849604ad319d6dc394048aa331c96f8aa5aba2af053e64430a71f8ec1364dc7c599a17babb89bf4
-
Filesize
114KB
MD55ec95fc0f5cdf1f5f2dc54a3d10497f2
SHA1bdeed415ac4638ef02d84befd40139a7c5713bec
SHA2569209147c34fa89323ded28912df7f77cfe64eeb304451410c38222c2c1f93fa6
SHA512d418e9bf04a9c4cd980ae9ac13c5bb1bd0721e2cc9bebaad1b78d73523168ef5edfdc9da6ea1d01aeeea3a4ee74c6ef49cb97be3c468fb6de48d98bb6ecbc599
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd