Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 22:52
Static task
static1
Behavioral task
behavioral1
Sample
r.rbxm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
r.rbxm
Resource
win10v2004-20240226-en
General
-
Target
r.rbxm
-
Size
16KB
-
MD5
4ba68770e1ef7c45fa91be941ad26af0
-
SHA1
10b51d3207db5b55548b6eb131918c3368e7cfd9
-
SHA256
bf2b00c0db85aaff70aef27c502fc449e04101db4c267fa0bb2f4bc8a6896d7d
-
SHA512
7f5385813d19c025283aa3114df982b8603e9b5623057206dff08eab7b35e5a8012a6b139072b60c50cf48d0b4dff3ae3216101ab8a701a3ef58c7ec311fee97
-
SSDEEP
192:53Ehhj8/wPIlZIfb9meCa1W002ISOjY9b4en9zbqgyuFhgQbI+CJ+LUCaU4t+:wq0IIfpCao002ISOUbXvqgyujNdLUlt+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 7fa9b7720969da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{16E791F0-D68C-11EE-87B8-D6C6679D10A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{1581FA4B-B715-4F5D-A875-8DD6C25475ED}" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133536343956525139" chrome.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings iexplore.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4356 chrome.exe 4356 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4364 OpenWith.exe 3304 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4848 iexplore.exe 4848 iexplore.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SetWindowsHookEx 58 IoCs
pid Process 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4364 OpenWith.exe 4848 iexplore.exe 4848 iexplore.exe 3688 IEXPLORE.EXE 3688 IEXPLORE.EXE 3304 OpenWith.exe 3304 OpenWith.exe 3304 OpenWith.exe 3304 OpenWith.exe 3304 OpenWith.exe 3304 OpenWith.exe 3304 OpenWith.exe 3304 OpenWith.exe 3304 OpenWith.exe 3304 OpenWith.exe 3304 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4848 4364 OpenWith.exe 95 PID 4364 wrote to memory of 4848 4364 OpenWith.exe 95 PID 4848 wrote to memory of 3688 4848 iexplore.exe 97 PID 4848 wrote to memory of 3688 4848 iexplore.exe 97 PID 4848 wrote to memory of 3688 4848 iexplore.exe 97 PID 4356 wrote to memory of 4500 4356 chrome.exe 105 PID 4356 wrote to memory of 4500 4356 chrome.exe 105 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 1448 4356 chrome.exe 107 PID 4356 wrote to memory of 4288 4356 chrome.exe 112 PID 4356 wrote to memory of 4288 4356 chrome.exe 112 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 PID 4356 wrote to memory of 3164 4356 chrome.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\r.rbxm1⤵
- Modifies registry class
PID:1400
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\r.rbxm2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4848 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3688
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0xfc,0xf8,0x128,0x7ffbbec49758,0x7ffbbec49768,0x7ffbbec497782⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:22⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1976 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1912 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4652 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4876 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5156 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:82⤵PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5068 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5592 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:12⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5752 --field-trial-handle=2008,i,10796657549129876104,11776860201219128506,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
168B
MD5d6f014285d2831a145cea8bfe087278a
SHA1c21588da33c7c871c1c21dab695006c44ca8d601
SHA256b229ac94a43bb26fc30baf0cff9a801f6958eeecab559a14c1ce2b5dfd8bb8ab
SHA512bb6a3eb3f3c7f333795b43b39dfc2a39e29c1a7607d96f564f2a247089830ef07fe3552237538ce7fa5c434e572742cfe274e82c1a5f4da0d486a904a679b888
-
Filesize
168B
MD5cd00adc826a1af98967ee8f791142c47
SHA1de18285ef24ebe4a19ae9ea73dcf163ec4c8efbc
SHA2567b7c6b0c614f3980700bf05b30c9a1b960d97caeb969db372e371c1552bb3d66
SHA512491b8ecf300cbc02e65d01e0b730ef182a99677c094c0b59ac29cf2cacd0ac497721b7d8a7588231b70cb6b3bd480edfccf3b2621e570ba0810ab6a1e37eb08f
-
Filesize
1KB
MD5524c4405739f12e4048eb0484f277fed
SHA1a33513ebd80bbb964e4722317404065e857749f3
SHA256e5eee53296ff2b8fc3efabf0c01310d2461d6830889bbe12dcdc6f11bff93e17
SHA512547d1db221b5a21addb7858ae5501302eb3bcac665fcbc75edcc1280060d39c9e8b0f255eab6c633d9ded2ea779460ca0745e3c92ee5024ac7c5eefa869a8f81
-
Filesize
371B
MD5ce588c48d03b1f624a5edc2b0d5882fa
SHA1b01b30e43262d140f2eac77a616c6ff0fdf6fd77
SHA256f31c1e51a84dc463e699ff954f8da11e494eb876def3b275c3902f040fd3a186
SHA51249e25691d6407b606df59262422b79b479252fb7db7cb1502b9dadc75def7aedcebdd4b6342599f33e24e9e28cacda88d2c491b0d31ee35fadfc5796bf0255a4
-
Filesize
6KB
MD5504b9b5d39ccffc4f69ccaca798b0d02
SHA1b5b8ef4946b184fa7068e2bf85b8b0c4da164ab9
SHA256cec5420bf599028e2afb637dce07388768525ab858209d8a25d0b2af0cff2a24
SHA512f14d936d4008ed353af2623d16ab67aaee315587cdd322e59160e06d35ef70f1dec77a5d30d7a895e8124d46f6fb2b49df78687a6103af6a9f2130f3bb76393f
-
Filesize
6KB
MD5dacd25d29c71ba0d5bd78f6338362e19
SHA13f09109163cef94c90b0d94e8efa973dfaeb0455
SHA25618fd28c392a87cb028743c9ab02bd47220f09b7b7cc6c4b8596e0d8ff389db6e
SHA512e585c47d045178fed11a6c4a54beb56eee9ebd00c9dbe72f2c2543924f0c7d247d2bfab4fd8f44a9c3119b9d4e82132638142a534efff0c7d7db3a55ae55b5d4
-
Filesize
15KB
MD52e004e39314f991c76e6f450e3138c65
SHA1ca11741f1e1fef4470c565f08e9fdf4ace23fbd3
SHA2561a0c65c2669d0d0b6ccc2d896c732e17a6d27ae5d43cbc7a6bc2dac16e382b14
SHA5123bea570cad7e4da4be14efe0fa71a87b08cb5a9b2351f9001fef9457ae470f813019cc0c326cce0335d586ade6a88bd4bbc858197dbf2e72dc4e709d1627f1e1
-
Filesize
254KB
MD57be44d296563c9455db69dc669af1b33
SHA1d16192b59cb2184c250a8dd5cb7ec8fb4cca827a
SHA256ef9b16c5ff16527bd1c0a9f03a68bddadcc54bd0e34059303288bdf833755f0b
SHA512123d254dfeda8b6f7b5af02dfda62aed01401f93f86d84ad9c5d855bd50187325e14408b306d65070302fc166adc91ee31a521db8ad8fed8d40ea0ddb52f77d8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd