Overview
overview
4Static
static
3CapCut_732...er.exe
windows7-x64
4CapCut_732...er.exe
windows10-2004-x64
4$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ed.dll
windows7-x64
1$PLUGINSDI...ed.dll
windows10-2004-x64
1$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDIR/res.zip
windows7-x64
1$PLUGINSDIR/res.zip
windows10-2004-x64
1app_warning_icon.png
windows7-x64
3app_warning_icon.png
windows10-2004-x64
3banner_bk.jpg
windows7-x64
3banner_bk.jpg
windows10-2004-x64
3btn_dark_1...le.png
windows7-x64
3btn_dark_1...le.png
windows10-2004-x64
3btn_dark_1_hover.png
windows7-x64
3btn_dark_1_hover.png
windows10-2004-x64
3btn_dark_1_normal.png
windows7-x64
3btn_dark_1_normal.png
windows10-2004-x64
3btn_dark_1_pushed.png
windows7-x64
3btn_dark_1_pushed.png
windows10-2004-x64
3btn_dir_disable.png
windows7-x64
3btn_dir_disable.png
windows10-2004-x64
3btn_dir_hover.png
windows7-x64
3btn_dir_hover.png
windows10-2004-x64
3btn_dir_normal.png
windows7-x64
3btn_dir_normal.png
windows10-2004-x64
3btn_dir_pushed.png
windows7-x64
3btn_dir_pushed.png
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
CapCut_7320594087726481410_installer.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CapCut_7320594087726481410_installer.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/deviceregister_shared.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/deviceregister_shared.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/downloader_nsis_plugin.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/downloader_nsis_plugin.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/res.zip
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/res.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
app_warning_icon.png
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
app_warning_icon.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
banner_bk.jpg
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
banner_bk.jpg
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
btn_dark_1_disable.png
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
btn_dark_1_disable.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
btn_dark_1_hover.png
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
btn_dark_1_hover.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
btn_dark_1_normal.png
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
btn_dark_1_normal.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
btn_dark_1_pushed.png
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
btn_dark_1_pushed.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
btn_dir_disable.png
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
btn_dir_disable.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
btn_dir_hover.png
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
btn_dir_hover.png
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
btn_dir_normal.png
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
btn_dir_normal.png
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
btn_dir_pushed.png
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
btn_dir_pushed.png
Resource
win10v2004-20231215-en
General
-
Target
CapCut_7320594087726481410_installer.exe
-
Size
2.2MB
-
MD5
c91e097550ea6ccedf592d8b83414e0d
-
SHA1
021f3f26d86f98af28dc987baad8714f64867207
-
SHA256
4a9d815f284adda187982e2b24da2beaad860739bc4b4cb1cf26408e7c221dd6
-
SHA512
916898c9850ddfcd2c11da7421eeffc4d48406d9ad4787a4dc572ec17a81a39edd30733aa8cccde8b31450ff8031e3da68be019a8a0eff50c0a17ed4fa0aa3c9
-
SSDEEP
49152:uGVKq6wrr98ArcTTuVMZCC8GYCNbFLg3dlXI5x8oaigMv3Dh:uGVLprJ8ArnVMZCUPFcNlXID8en1
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
CapCut_7320594087726481410_installer.exepid process 1224 CapCut_7320594087726481410_installer.exe 1224 CapCut_7320594087726481410_installer.exe 1224 CapCut_7320594087726481410_installer.exe 1224 CapCut_7320594087726481410_installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
CapCut_7320594087726481410_installer.exechrome.exepid process 1224 CapCut_7320594087726481410_installer.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2520 wrote to memory of 2600 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2600 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2600 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2896 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 1820 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 1820 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 1820 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe PID 2520 wrote to memory of 2552 2520 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CapCut_7320594087726481410_installer.exe"C:\Users\Admin\AppData\Local\Temp\CapCut_7320594087726481410_installer.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e89758,0x7fef6e89768,0x7fef6e897782⤵PID:2600
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:22⤵PID:2896
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:82⤵PID:1820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:82⤵PID:2552
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2240 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:12⤵PID:2324
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2232 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:12⤵PID:2488
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1392 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:22⤵PID:684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1320 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:12⤵PID:1576
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3020 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:82⤵PID:1652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3572 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:82⤵PID:1664
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:82⤵PID:2112
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3792 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:12⤵PID:2560
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3892 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:12⤵PID:2880
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2528 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:12⤵PID:1180
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3000 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:82⤵PID:1840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2960 --field-trial-handle=1380,i,1140468598980706814,6943510636366035707,131072 /prefetch:12⤵PID:1508
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5f1a7ddb583d0f2bb7337c55868dbca7b
SHA1db74bc73b56c98b222e389a8a9160b7078c587f1
SHA25629459065b8f065337f098ca560c2b7b1b16d194f419273a8a39b41e53f6ff080
SHA512d00b328755b8ff7821261b1a49a766295cb90a7775f3f198a4a8988a9a7b352f8587ab5989e0abe38553f13b8455e8a6735dc7a36411ecf000fbc6a010e70e6f
-
Filesize
40KB
MD51128652e9d55dcfc30d11ce65dbfc490
SHA1c3dc05f00453708162853a9e6083a1362cc0fc26
SHA256b189ff1f576a3672b67406791468936b4b5070778957ba3060a7141200231e4e
SHA51275e611ba64a983b85b314b145a6d776ed8c786f62126539f6da3c1638bf7e566c11daf18d1811b07656de47ff8b50637520cf719a2cacc77a9d27393fc08453b
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
160KB
MD556c17f9474e979ef4b887a4d9b65548a
SHA1c0a6fb18d7c7126361cfea40862a86c4f77e3805
SHA256ee09a56cf69bf176e558c84016652ae4fae69a32133ee4643e081c3db23ebd49
SHA5127cbb6295bee41e9c0bf3fea48ec27265f5cdc4ca9ce7d878e9a62896dabb934e9f3b5850acf86f1414d57a8fa3b9f2e2a0ae01b888773569ef24472c002c4e9e
-
Filesize
525B
MD53843c52bc29b6c50cc1068f612ed8c01
SHA1f2831ecf5798b058642cc8023787d8b72d0625bb
SHA25624502e797b95c4cd8ecff2c1530e52859950ce463b7a8f5456d9c82b53aa91b6
SHA512c2e5518bb5b1b48a63841f080c8af8f9a73dd897812d9efdf8544712f0a2dde8d337fc5fb4931e38f7153aa3cc7f19abc02848ad17846ecc776ec23910e5f1a0
-
Filesize
525B
MD512de41612520984aa64ab5ab4fd02e02
SHA120ce428f8b16314d3e33aa12c3145ea7648ad2ec
SHA2568ec9f16d9a6191f4be726624fdda0a047f0f404f0dbd7720e3239d4700e444cf
SHA512fa0c3561ec196cf2581b336df92fc3ff0e07ef05eefa77761e56cef1e2de6b4a1971a5fc9efbab5eaec9a186ee88e719d7dd7c411b42b4a843f65ef711f62368
-
Filesize
525B
MD50a9161c15dd21f24c69d450a2bc4f73c
SHA124a03c3ae641f13051ce70cf326b7b61ff8d3871
SHA2561595d1f8e1d0226c9dfdb3cb4cfd71ad5bb2648546390009fee0fbb02ee2df88
SHA512f127903248afbc4f89a77e3f7dfdb74a172b79591ac1ce2c1d4c5776b94ff53c64326380cdbfec0ed21a34dfb4d5c493b50b3f8e4b926a67a4a340b75cbf2b39
-
Filesize
6KB
MD5a948ca696053eacc5e5e333f77f350f2
SHA1f2beaae3516e9fda2e01ca1d0cf4302a4c1ca1bb
SHA2563446f6854de6d44cc672079bc11dfdca746edbf4d8c0595452e424090c13c8d0
SHA5129b1cc0403ce24ba6a17f1f1811284cf46a224c9c361bfbc288d83b23cd93e472ed0c42ee3bcc4c6ed02b00b20011c80019248bb0973b70f6cb7524d609eee048
-
Filesize
5KB
MD537b7c07da45d0f6b2d1e0e1033c386d1
SHA1fd21f1de352d2efb5e8d0943ee3f3373ffe2b69b
SHA25625e32a04dd87861a3214247b7586db43c2302fbd32cb18bdf86d1bb392ce13b1
SHA512609753a0f3ecbc6bc2bdd462011838c13033bb475604bd7ac52acb02fd526370cea597b0b3bf6209ee2b743dda54b1f922f3732b801834c379d6813ba248b486
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
232KB
MD5e6cf77625562fa2ddc6b71cc638a0dac
SHA1eb71764a3cb0d5ca87526bc710f44a07fae21fc7
SHA256771cbdeb8d36e5d8980ee0686148effa64b1615b2989b351adbe6304da3bb401
SHA512c9591113fd7768960a8dcf7e566fbbaa83479159bd477242cabfc4f2c0e2e5953a5242a10577777b4eaa31957e73701a57867df58886bb8d1adba6a129b31483
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
1.2MB
MD5f181413906a465fd0dd68cc4a3d98803
SHA15aa28be48047dd0b672ab98d5e7cbd8260486b4b
SHA256e28ff7b8fc4b1eb2d1f394ce15de2fc031cda58db645038c8c07581c31e79dda
SHA5128d0116bcbc3938b2ebdddf77dec87e4b6c872382d20b555571b0bc3e4a35f88d16bc450004f875a8271165b71bdbae5d4d474a5bfda4c7787da63f4325009c25
-
Filesize
2.3MB
MD5c052c0a2ed833d924b7799625413ac1c
SHA1bdd08a29f4de283ba0eb3cda4abc26f6e85d4d5e
SHA256098972cf9ddc9d574130e025a252a99b278de9cc0ae700acfb8c935c24eb1172
SHA51289e67c29d5d8a401a70a5b572844f24bfde82d5d4259ecc5e6f12be0ddb434995a2e985914fc421973998e3fdc48b133e269e8bb1da513ec66199f01060162f1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
2KB
MD533ec04738007e665059cf40bc0f0c22b
SHA14196759a922e333d9b17bda5369f14c33cd5e3bc
SHA25650f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be
SHA5122318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
516KB
MD5a00afb1e926011eb3faed79e76c54b70
SHA1ca0a5d48c75474cbd57e66c359cfc791ce1527db
SHA2566844bed3d2bda5a90153b0303ea03311d8a5de8c6ca57cf83a573b9c1d2985c7
SHA512845f95a87ba10f3f6f69cfbd0c45d6096670f85bb24b4dec0a366b9bb96d330bee74c9e7d6e336792d5a9bc991fed3042f651237cdbc340ceaaad2926fec9de1
-
Filesize
404KB
MD59e63641f1443dae6f1d09678a3342cd5
SHA1cfa96419cf20c96175e73cfd73a978a8d4b636b7
SHA256477be7787d3c36438eee2598d77f2d2b992f0d8f61dd07bf5228c01693976e64
SHA512f0433e1fbf6ad80ab83c48db29cf02dd90e6bf29933b13f235b8e0aaac37d575e3484263ba7b3922f9907c5ca11731174a09b96f5d720819b3377898b209d4d9