Analysis
-
max time kernel
42s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 17:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url.emailprotection.link/?bBGNLfK_ziBGk0kcSpB1KeNUqq4prgfX5HC4yfeqvuVBTqb0P_IzePuGB0HL-CUimRHi_kNWZLu9qaMRievkuVeHiQGz2kiyJ2moua29s9zxkgelg4pQ-uXtNiPr9_WhtX9BG3MA4D15ZnzjmPqU44Gaou-QVa0Ed3BtpoWtguNWq2sZzh14INGA7Uj23whyp0g0aR_C8iu3uiKp4tjk7fxTUPjXwJ0djwd6HjKHdVRMw5aqSYlCehqYhUo-yUQxA_9ijsiVA_zC1Sz3d6edB1x4EkSSpkc4mfauIyP6ra0wgDN7YkhgLUf9zFa7Cw67e2TffuNAB0yUEhWcjKG1BHCzcR0as88ZWIJ7ZVqguZLKPZ7fps9pOBXREI9UJUYoCFO4iur5-N8iW4TaMj0bwU3f7tF52B-HNoxQ1BGvj89rb1aAgtGO1ekblvC34lZpci-k4u1rlI84g9uZNqztZDghB6noOu4HCYjx1ix_29JgRkGukZraQ6dK-v1EXzH4G-pBr1ARuuRfSL-Hn0jDQdMUDTWDnn9hDsZ7u66hYe6BLNSs83J0GPZfMdaDE3gptfZIouyMVKcZDOxAvhPqCLPDVlpEyjAogCutOV934og2_PO8fUQZZJZ6jVT78PMYXeTA74tEEwGEeuHc07ubH1qxQdlLjhfQwUNeheeW2qlJAaj5swjnt49Qb9xdztRMGYL92YU9hEkp633Cv81Kx33ao-6hm4WJGyYWhq9pelu0w6l00Sc0zJZLadLpO0QTJEsoOC5LmP3t830n3W6bb76M4pzIB0qje4XPl4EA3sZHhNGcVhzlc0rGp8PLZvMKeBHnPaL1WZC-CoJlLsmBa3Xw0IXsA4Hz9DxVctAJU6a1cem9YQ5fkKGtK5hJshVDwmyyIUo7ZaYLDe-_oy6Ni2Yaz3jHVTsm2NzjWurnvOqkY0U6MxyWmSe6M3Z32ytDEblLcRSkOgu03GpGv_oSv5BbnOD4GIIZuUsh19tFT61Eb8E1vzbWoXuRiOxNDzrptfwq3xLcmKKsjK_7TzEE6jrAUnMP9YymEh9xVA-gfOn8~
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://url.emailprotection.link/?bBGNLfK_ziBGk0kcSpB1KeNUqq4prgfX5HC4yfeqvuVBTqb0P_IzePuGB0HL-CUimRHi_kNWZLu9qaMRievkuVeHiQGz2kiyJ2moua29s9zxkgelg4pQ-uXtNiPr9_WhtX9BG3MA4D15ZnzjmPqU44Gaou-QVa0Ed3BtpoWtguNWq2sZzh14INGA7Uj23whyp0g0aR_C8iu3uiKp4tjk7fxTUPjXwJ0djwd6HjKHdVRMw5aqSYlCehqYhUo-yUQxA_9ijsiVA_zC1Sz3d6edB1x4EkSSpkc4mfauIyP6ra0wgDN7YkhgLUf9zFa7Cw67e2TffuNAB0yUEhWcjKG1BHCzcR0as88ZWIJ7ZVqguZLKPZ7fps9pOBXREI9UJUYoCFO4iur5-N8iW4TaMj0bwU3f7tF52B-HNoxQ1BGvj89rb1aAgtGO1ekblvC34lZpci-k4u1rlI84g9uZNqztZDghB6noOu4HCYjx1ix_29JgRkGukZraQ6dK-v1EXzH4G-pBr1ARuuRfSL-Hn0jDQdMUDTWDnn9hDsZ7u66hYe6BLNSs83J0GPZfMdaDE3gptfZIouyMVKcZDOxAvhPqCLPDVlpEyjAogCutOV934og2_PO8fUQZZJZ6jVT78PMYXeTA74tEEwGEeuHc07ubH1qxQdlLjhfQwUNeheeW2qlJAaj5swjnt49Qb9xdztRMGYL92YU9hEkp633Cv81Kx33ao-6hm4WJGyYWhq9pelu0w6l00Sc0zJZLadLpO0QTJEsoOC5LmP3t830n3W6bb76M4pzIB0qje4XPl4EA3sZHhNGcVhzlc0rGp8PLZvMKeBHnPaL1WZC-CoJlLsmBa3Xw0IXsA4Hz9DxVctAJU6a1cem9YQ5fkKGtK5hJshVDwmyyIUo7ZaYLDe-_oy6Ni2Yaz3jHVTsm2NzjWurnvOqkY0U6MxyWmSe6M3Z32ytDEblLcRSkOgu03GpGv_oSv5BbnOD4GIIZuUsh19tFT61Eb8E1vzbWoXuRiOxNDzrptfwq3xLcmKKsjK_7TzEE6jrAUnMP9YymEh9xVA-gfOn8~
Resource
win10v2004-20231215-en
General
-
Target
https://url.emailprotection.link/?bBGNLfK_ziBGk0kcSpB1KeNUqq4prgfX5HC4yfeqvuVBTqb0P_IzePuGB0HL-CUimRHi_kNWZLu9qaMRievkuVeHiQGz2kiyJ2moua29s9zxkgelg4pQ-uXtNiPr9_WhtX9BG3MA4D15ZnzjmPqU44Gaou-QVa0Ed3BtpoWtguNWq2sZzh14INGA7Uj23whyp0g0aR_C8iu3uiKp4tjk7fxTUPjXwJ0djwd6HjKHdVRMw5aqSYlCehqYhUo-yUQxA_9ijsiVA_zC1Sz3d6edB1x4EkSSpkc4mfauIyP6ra0wgDN7YkhgLUf9zFa7Cw67e2TffuNAB0yUEhWcjKG1BHCzcR0as88ZWIJ7ZVqguZLKPZ7fps9pOBXREI9UJUYoCFO4iur5-N8iW4TaMj0bwU3f7tF52B-HNoxQ1BGvj89rb1aAgtGO1ekblvC34lZpci-k4u1rlI84g9uZNqztZDghB6noOu4HCYjx1ix_29JgRkGukZraQ6dK-v1EXzH4G-pBr1ARuuRfSL-Hn0jDQdMUDTWDnn9hDsZ7u66hYe6BLNSs83J0GPZfMdaDE3gptfZIouyMVKcZDOxAvhPqCLPDVlpEyjAogCutOV934og2_PO8fUQZZJZ6jVT78PMYXeTA74tEEwGEeuHc07ubH1qxQdlLjhfQwUNeheeW2qlJAaj5swjnt49Qb9xdztRMGYL92YU9hEkp633Cv81Kx33ao-6hm4WJGyYWhq9pelu0w6l00Sc0zJZLadLpO0QTJEsoOC5LmP3t830n3W6bb76M4pzIB0qje4XPl4EA3sZHhNGcVhzlc0rGp8PLZvMKeBHnPaL1WZC-CoJlLsmBa3Xw0IXsA4Hz9DxVctAJU6a1cem9YQ5fkKGtK5hJshVDwmyyIUo7ZaYLDe-_oy6Ni2Yaz3jHVTsm2NzjWurnvOqkY0U6MxyWmSe6M3Z32ytDEblLcRSkOgu03GpGv_oSv5BbnOD4GIIZuUsh19tFT61Eb8E1vzbWoXuRiOxNDzrptfwq3xLcmKKsjK_7TzEE6jrAUnMP9YymEh9xVA-gfOn8~
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1340 chrome.exe 1340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe Token: SeShutdownPrivilege 1340 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe 1340 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1512 1340 chrome.exe 28 PID 1340 wrote to memory of 1512 1340 chrome.exe 28 PID 1340 wrote to memory of 1512 1340 chrome.exe 28 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 1136 1340 chrome.exe 30 PID 1340 wrote to memory of 2604 1340 chrome.exe 31 PID 1340 wrote to memory of 2604 1340 chrome.exe 31 PID 1340 wrote to memory of 2604 1340 chrome.exe 31 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32 PID 1340 wrote to memory of 2576 1340 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url.emailprotection.link/?bBGNLfK_ziBGk0kcSpB1KeNUqq4prgfX5HC4yfeqvuVBTqb0P_IzePuGB0HL-CUimRHi_kNWZLu9qaMRievkuVeHiQGz2kiyJ2moua29s9zxkgelg4pQ-uXtNiPr9_WhtX9BG3MA4D15ZnzjmPqU44Gaou-QVa0Ed3BtpoWtguNWq2sZzh14INGA7Uj23whyp0g0aR_C8iu3uiKp4tjk7fxTUPjXwJ0djwd6HjKHdVRMw5aqSYlCehqYhUo-yUQxA_9ijsiVA_zC1Sz3d6edB1x4EkSSpkc4mfauIyP6ra0wgDN7YkhgLUf9zFa7Cw67e2TffuNAB0yUEhWcjKG1BHCzcR0as88ZWIJ7ZVqguZLKPZ7fps9pOBXREI9UJUYoCFO4iur5-N8iW4TaMj0bwU3f7tF52B-HNoxQ1BGvj89rb1aAgtGO1ekblvC34lZpci-k4u1rlI84g9uZNqztZDghB6noOu4HCYjx1ix_29JgRkGukZraQ6dK-v1EXzH4G-pBr1ARuuRfSL-Hn0jDQdMUDTWDnn9hDsZ7u66hYe6BLNSs83J0GPZfMdaDE3gptfZIouyMVKcZDOxAvhPqCLPDVlpEyjAogCutOV934og2_PO8fUQZZJZ6jVT78PMYXeTA74tEEwGEeuHc07ubH1qxQdlLjhfQwUNeheeW2qlJAaj5swjnt49Qb9xdztRMGYL92YU9hEkp633Cv81Kx33ao-6hm4WJGyYWhq9pelu0w6l00Sc0zJZLadLpO0QTJEsoOC5LmP3t830n3W6bb76M4pzIB0qje4XPl4EA3sZHhNGcVhzlc0rGp8PLZvMKeBHnPaL1WZC-CoJlLsmBa3Xw0IXsA4Hz9DxVctAJU6a1cem9YQ5fkKGtK5hJshVDwmyyIUo7ZaYLDe-_oy6Ni2Yaz3jHVTsm2NzjWurnvOqkY0U6MxyWmSe6M3Z32ytDEblLcRSkOgu03GpGv_oSv5BbnOD4GIIZuUsh19tFT61Eb8E1vzbWoXuRiOxNDzrptfwq3xLcmKKsjK_7TzEE6jrAUnMP9YymEh9xVA-gfOn8~1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7239758,0x7fef7239768,0x7fef72397782⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:22⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1636 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:12⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:12⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3156 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:12⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3372 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:22⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3400 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:22⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3632 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2276 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3644 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:12⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1264 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2396 --field-trial-handle=1208,i,8445189409009223325,18351535903720325393,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b9b8c38b097b253526a198125ee4ccb
SHA1e9baa1ef628f64997cfd98352389be1ce88639d3
SHA2569100f105d075c324a010a64ecd7b2d41f89e4d61e5049fe4fa1a4c8c996c93e7
SHA5125a448dfcc600179642a38cc095e6e3c44a6af0f003d2be238e481ab59cf5344558fce47b9f6256967247f6bda766f65fb262b8b24c28b050c7c8f40fb0b1782c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f0f428eeaf8a247896624cf0c253ee2
SHA16465559035e5873360a44be5fcfafef031bd6b48
SHA256314437573f2d945cf2048e852c4c6306f20dfc0d2cfa62bf68cfe011a96d6cbd
SHA512b46966d663ab01a2784c471e162d7f778a781f3aee34791b4543b2117fb0d605ad62a4f900a46ae35a40bf6b4d0725690e4611d001507ba093d1851b8437a2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c8fcc8dcff229f2e061d2836a90b40e
SHA1e84232d92c4d4a149b5d96ed0c41dceb3be22dfb
SHA256c8900cda9f73d502645519331ad64cd16060b023bbdb14bc7fccccab5ae0f668
SHA5124dd79de2b13ceea5999f0ee901d186fd8a1d27ccd89c9df4dff6d9bb9f04c32075853db8b1823724beda2e436b31fd6ac2677de58df8e2a51a1fb813fb2aa7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e83adbf519ba761bccbbe8307d4cf320
SHA13a2f9a4b8387da91bf98aa2ac5274616b826de9b
SHA256855393ebedb5bc9832c7d92f3afba38c1af849603655090ba5b51edd5df0a718
SHA512d2b85124a2bb108888906f774e1460d015e36c11fab44aa10ac91b1a851d6b98538ae3cd3c2917a60a1b6082d6caf3c7f288d47359a7a0cedb48ced78dfe660c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8b1170a9-5e1f-4202-abe9-77a72568c6cc.tmp
Filesize5KB
MD522d7469b32ee5ef50cbfebec6edb3b4e
SHA18d3d45d831ef3f56833e4133bb44a67c7d22d13b
SHA256be30da9ab09a4e6e33a7d40ce8dfc1498009c39db1da852ee745b45bdb865259
SHA5123469d1ba0ac66fae55a98b13cc9a1d012e0506f6322118399d30e93d70814681450fb50c52a2faee86582ed4d8291b6802ecad0475c36fc483523086452c7ada
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5827677ceda9b40319a3a4551bb037afb
SHA1764285e044dd7c2470053e9f9a4f7d5a8ab5a471
SHA256c073ea2487f1563e2c0505b98fe8a5cbbcac57cf26f3b8d6267c95c4bec45957
SHA512a456c1f6ecee5b80157f5297076f9a69be8642dfba2b2aa70d943f0ea2d08d577c2191a592d2dbf3a1266ea279a3be765bad5a55b748367d9e038ccb6c3403bf
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06