Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2024, 17:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pastebin.com
Resource
win10v2004-20231215-en
General
-
Target
http://pastebin.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 13 pastebin.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133526639075777894" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 5840 chrome.exe 5840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 47 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 644 1868 chrome.exe 84 PID 1868 wrote to memory of 644 1868 chrome.exe 84 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 2336 1868 chrome.exe 88 PID 1868 wrote to memory of 224 1868 chrome.exe 86 PID 1868 wrote to memory of 224 1868 chrome.exe 86 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87 PID 1868 wrote to memory of 3004 1868 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://pastebin.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2c349758,0x7ffa2c349768,0x7ffa2c3497782⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:22⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4632 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3224 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4040 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:82⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5572 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5604 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3280 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=6052 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=6072 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=6068 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=6600 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=6752 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=6808 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=7096 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=7264 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=7440 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=7600 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=7288 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=8020 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=7952 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=8216 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=8396 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=8548 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=8176 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=9032 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=8980 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=9152 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=9248 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=9252 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=9580 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=9632 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --mojo-platform-channel-handle=9896 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=10016 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --mojo-platform-channel-handle=10252 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --mojo-platform-channel-handle=10180 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:6972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --mojo-platform-channel-handle=10492 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --mojo-platform-channel-handle=7252 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --mojo-platform-channel-handle=10636 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:5320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --mojo-platform-channel-handle=7084 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=10504 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --mojo-platform-channel-handle=10984 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --mojo-platform-channel-handle=11012 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --mojo-platform-channel-handle=11312 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --mojo-platform-channel-handle=10832 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --mojo-platform-channel-handle=10968 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --mojo-platform-channel-handle=11692 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --mojo-platform-channel-handle=11088 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:12⤵PID:7924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1968,i,5353247153190589829,210043781604960591,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5840
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD547edefe61b20751d8a4627be8bc0497a
SHA1eea6ffd2e1f1b6e87fbbab83f5b2fd5cc81b79ba
SHA2566bcaa27876393730459362c0f92a79075ee80c40d33d6353eca96aa63f5ebfef
SHA512f011bed709b4be284a21ffbb4f9e294aa394492176d06c5d1cd95a67e9e43e88dc35382148dce01814a73cf295af54ddc647dde2d566f2aad675a4a4e8fb2cf0
-
Filesize
23KB
MD5e569b5f6f14852ff50ff8b6020799f68
SHA117cdeb1d710c8011cfe932c31bfe0913373f39ff
SHA2569ffec84a0d845309dd4c4b19fc797375f97ecf0773729cd12c7eaafae877e384
SHA5122a41d1f2af7c1fd30e9370f37d1807bece58d11d3e33b9325e13062f9a3bc3b73ff47729a0a09936d40fc91f8af09f37447a20cffb3ff4b144eb7b42f63cd820
-
Filesize
85KB
MD5427a0d93f68cfa04fdb73e5264a654bd
SHA1068f14833d59d495787ca0cff8b31cb77fab463f
SHA2561e0ba86f8bac11896b4813e6504352db20b01ccb575e0b88d26669d6284e6ffe
SHA5123dbd1f5470c8bea695fb9047511f5e4fbf8a4ca7c554447ec04151138872dc9a9fb7da9afc9a4b59738f877b2bd9a7a9c024754c93826663602264baf9481834
-
Filesize
241KB
MD5bb21f0142660167a7221733e1d8c52a7
SHA19601d6b174ddec3a2d9226e35c3667b5f2384cdc
SHA25619ab2be029a03c15dfa56da1d466920d96d832ec989b447e0f44328496d2be22
SHA512910be468b61fe5303303be94831cb58e10896a1c0e408eb367a4e8ca01c0e6183c491c77c20aadf5a4fc90808de90ad70511ccb78a8ab8fcd501e37ac970d432
-
Filesize
1KB
MD523d026529e27cf590d576945d5c73f8f
SHA149458068dd0534c60c43e013a4221c5c801fe723
SHA256f13aeb3558ef788b4d362d52ff689bc28d8ff31919156f327aee9e5f70bfc9db
SHA512e8058007d85b7f42b4eb1e2d06a67456851e34cb726e430a89898f2862b8c02c3b5b4ae0a13b70241fefd47876e8fd06a6adbfefb89e1d75652e26ac9741d853
-
Filesize
15KB
MD55a808dbd65720812bea6b796f726d3be
SHA1db888f074a7ce2a5ec010d11fc2b2754adc84fae
SHA256d3f5aa868ecdec80ba88e3a6a623ddd428f9f6410a98ff74e8d00f72218b54e3
SHA512360263484e984fb4e9e21d9f87259118decf3ee6468f1ca1d4ef829a5f714bf92b8e6a68176a614676f6e2ee7940a9bdcb7e6abb94c6255ed63a27c01a1b37b2
-
Filesize
3KB
MD52db572a12b9c2c0e1f58d93aef5979f4
SHA1bc6f6a66a17d07869749c5e218f47d10687c7580
SHA25634b8072fe9d4544164e74079def0e68951a01721a170037a6e48d2adf0e28ffc
SHA512037b9ac13a46a83ba65cc71878c8d8d443933c8b0bbb5e3047a8e13835021dcba36d24bbcfe4b036390ba9b28505107c5a32f788a55bf245d7ade257a3ed7b3b
-
Filesize
1KB
MD5e63323f6fe9a3eb759f247574ed5d1b3
SHA1419865c5f018a29dd648739303dd02794213dcdc
SHA2563336d02a5902c6f6969eade1dd9918fe1e0bb99b9c87eba9ad7770530ceca466
SHA512534487d22d3413ac24de7deb08be7426e10eccc874b714239c1d4937167ed08a2f47b004bc222dd4ad74b8c255b3aa6461fa6424c906279be4f3d63da146ee1b
-
Filesize
5KB
MD5852f9a239c162779e63d20f673aaa687
SHA1fd7976b9a5f83ee9e4d1f3f2e254947ccbc613f5
SHA25625253340190920e1af86ee343ba790f5d7ddf076da3c5ab814195f8a8ebd162c
SHA5129178555c69f8a8004982bbc973f7d92c3fabb2e4c30e2f3bd34e9b67a9dba84f36059b7d1c08f629ef080575b4985bc94a7dbaff9e143e84247045765bed2e76
-
Filesize
6KB
MD589aa99698e9d5eb628dd3b75d3b61902
SHA10087ecbf29304cf00e7c79bd5f78ae6d1f615bcb
SHA2566b8946fe5b51b950fbe603fb99e11942737ee074c12a1cfe80623315ff365e3d
SHA512eb860b2954c975709428e1b2e9ca3f7cce5e5554b2bb14635c31f6e019af0ce81d12418950301f6865115cadb070cadf8864882c0b6b53d0bd872489683c7b65
-
Filesize
6KB
MD5469b50533874934c1c86b9e356ad6b78
SHA14acdf494dac72a83b86dcddc7febb3b1bdc62cec
SHA256a6b9a6a458148a429642a26ffd53ec5f4bd15beb650c4d3c2583d84afd910916
SHA512905b65e628bfd5f44804404660d37bf6bca7627b8f9911ca9470761048a2a2e3236f11c223060069f5ce9b7f5f0f0b392f46811c6527489db3ffe913a91e5ad3
-
Filesize
6KB
MD506f59a2db2051ca3eee13b045d5d3f78
SHA1cab010e69325c988f890130c4c803687f78e438c
SHA2568ebd4efc986b9ee1592e3de149ac20cd2d1a4690fb228b487fe0e7ddd5098b0b
SHA512c967875efe9e145c23063d9e18bad8afcbc4c2398d3d47f098dd6b6fb3acf744a5798bbad31825e794865b98051e79844eff4119473b272d0004e1ba4d6061b1
-
Filesize
6KB
MD5ff501cd18ba79dc32348a048f5ae23d3
SHA10d3f162b1f3fff54f32a224b74c2a45626f76d61
SHA256516cb8f567e763b0610f687c384d3f444d4633604aa82eafcdb8887eb40e2365
SHA5129f9bbda7b9cbf5264176d5fc17d5142dc7bc01ed967eb980eb036f622e556ced2682714821d0c8b7ad9f8c3219f6966350d63cd44fbf77628cad44b452a80ed2
-
Filesize
114KB
MD565630faf601dd31b8b922038d4c7f0ae
SHA155429966365e0fdb4a8c6cc4217177970d0acec7
SHA256b8a864f284ed5d8590f19863a0aa37dc1337551162b893c3cce0f00ae4da9bf0
SHA5126f075edc8bb988f4806b11067d2dff475e5d10406c1af0fee193d11a12323899a95bf8b12b818e5ad257aaf92b27707b940a99f415b0831f664c2f0193d7e124
-
Filesize
114KB
MD557a6cabdbf51466394c030349b8ec562
SHA12cc6d06964be5d7565fb3e5a87b8f7f78a3640a8
SHA2567e17cc8a14c8aef92a54e920fd77a9c987a807dc77d89e35ea70f4cc8ef2c676
SHA5124d1719a21fb98c9da8cbdda07dbaa525ea11d0a18a6ff85459d7e330f044e1a27330212487141178a87ac4172973f315acfd70d6ae4754c9fa08de49d4873f17
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd