Analysis
-
max time kernel
1200s -
max time network
1179s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-03-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
Gemini_Generated_Image.jpg
Resource
win11-20240221-en
General
-
Target
Gemini_Generated_Image.jpg
-
Size
211KB
-
MD5
cc57ca9f00f52e079d579a890c46cc98
-
SHA1
bef2d2281cfdf08715eaaa1e92c47703649cc2fa
-
SHA256
75cd908366bdd9c06590ce9f35141120da8297a4468f60732308adb0c789479b
-
SHA512
c29fff7978f638f740fd2fbcd789f44a3e53aacebdad883928e1b2b33b82bb6e1f51c712b02d27ebc8a387898b118cab564a7c0f8d9e56807e1001080578c49a
-
SSDEEP
3072:c/75rB+GkBmoTICND5ypIEnuFzSyN69uFxLkZo09OkCC378auFnCis2GO+vrFhBj:c/HDC+pexCULt0zCfnCt2kFhBqaSW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546425462191669" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1101742937-4171729779-750941522-1000\{9C097BA7-94FC-4AB9-BF76-9541EA485BC1} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe 1764 chrome.exe 1764 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1400 wrote to memory of 920 1400 chrome.exe 85 PID 1400 wrote to memory of 920 1400 chrome.exe 85 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 2480 1400 chrome.exe 87 PID 1400 wrote to memory of 4716 1400 chrome.exe 88 PID 1400 wrote to memory of 4716 1400 chrome.exe 88 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89 PID 1400 wrote to memory of 1660 1400 chrome.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Gemini_Generated_Image.jpg1⤵PID:4824
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff892ed9758,0x7ff892ed9768,0x7ff892ed97782⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:22⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4488 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5168 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:4728
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x254,0x258,0x25c,0x250,0x260,0x7ff786427688,0x7ff786427698,0x7ff7864276a83⤵PID:1536
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5228 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5452 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4564 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5812 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=6036 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=6040 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1764 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2416 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3436 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵
- Modifies registry class
PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=1528 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5556 --field-trial-handle=1772,i,7961238541814461729,14391914996887490192,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8aa266da-8f5f-4a1e-82e6-9531aa0d6b41.tmp
Filesize6KB
MD5f4302f38075cb475196c52c578e3457e
SHA1dbaefc4df848687c6dee2383a3fe16351f604d26
SHA2569f01427b65170fdb22d7fe2130c0adf16f4a009df4bb67424091a4dfd52f6f92
SHA5121bd141a86bdd82767577295fbf03af35cc2a23902f22f4005afe7ff20c6cc4cdd7c31d9ceb37e03ba113d979cc339575bff945d9df5b66142647804bc4e37648
-
Filesize
32KB
MD5617384ba88ea7fd6de0a9d4820adcf63
SHA1bc6aa462d355fa3aec22cbd1913e96b595631ef2
SHA256e14e1bd226e89eec255571fd49ebb33dbdfbffbcf375c06eac6972b8a082a09d
SHA512c98a7a32567f8e58361f9bdc23a2e5eccb6b766b0323a436c1f5dd1a50b5842f9239bfb6826b62ce6d73a81a04f69e9d88dbae6469b94ef2a48003d76bddad1a
-
Filesize
37KB
MD57f046f97722888264688eed9b73fea65
SHA1d3fde8c820ef3f5499788f5d1d7aedb40ed74042
SHA25605d7d3cf94a0213d747c5f3cc06354954c9b9a37ce579a5720570126a15e3418
SHA5126ca1101e70f3262efb24e211f223e18a866f9ea6ea828487db9b493b076882abf4572ceafc304e38b72a3db1fbc9bede9ba9af38aba93443ebffcd6bd3f024f5
-
Filesize
552B
MD55b04ea5d29742b24218dec57d3883a95
SHA119c4cec1a127574f39ab3fbc00a42366a0f2da5b
SHA2562b5ebaf046d0e60bbcaf19214fd76643d464dec9f6ec2a198e13811239eb48bd
SHA5125870c9daeec14138c54492fa47bb535e89aeeb0eb080af2b99bcaad06fdfce560552f29ac35e45229075942f2d5ef00b514d1e26de94c082b16fd7aadd684ff9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\62aabe46-2541-4a5b-9219-4ed6cf35c1fb.tmp
Filesize1KB
MD56ef598689b10ad30f8b50abe115cb9f9
SHA1668730837f0116b756ac81cdf042deac3e17d07d
SHA256f0fd59f1e41fc327d8e401ed23f7408671be920282234bd747b610a8c656b25d
SHA5126f77c0e1125331d5c0af47617978b013142e4fb128bcc9e42da2b74721f82d032a0855fe040676ecfde827123a78311ec2275f2aabda018110fdb9f577103eb4
-
Filesize
3KB
MD5bc42c177d2f986dfa7b65acbcf9e3532
SHA1960ceb236422d27fc5b3f4ecadf03348ab8bb8f4
SHA256dbf2ed19894ca450acb495f9b50ff49b35d42920d8babe9a4c77e74dd44dde98
SHA512a685f771301f7463460c3aad70df16bae0d10025bd2fa06a0b92c50972c1336c5768ed295b94f711dc98c5e02c833147418c251bb7265442e0f0229a2caf1bfa
-
Filesize
4KB
MD565199b93567dc61dffd3464da378d414
SHA110d4fdfaa76d1b6ae699d49aa5dcd2d637bb7a0d
SHA256ab4d0f1c24f5f4dbc22d25308f47262478b1dbd6bdc687ba6f374ada2355e320
SHA5123c2850296b6ab6104bafcf3283c6f718591d3445bb46038371b51275acc52d2754ef8899dd6357544ed90655ddb9d2e18dd1223266d38dbd5adb328d376f031f
-
Filesize
4KB
MD58df7dd6db86be64c2e282fe83bc806da
SHA191fa93e7849a1f680a18937e43142a31f7af3359
SHA256090c8c698150cbe3df0adea559d36b2dca945cddc5e63be6e26d4dce30302a30
SHA51231bf2017604572c2427473270a15f79ef70ad0d5d92737c4025fe04c79313a6e27a8707309c7ffcbfa88dfba289d4ee09f958ee725504ff268f444ee371f1147
-
Filesize
4KB
MD5690f644c72116e9fa81a48d636bb998b
SHA148b61688afadec221b713cbeb6a3ad1f6097d7d8
SHA256946157d9c4f3707ae0974779c37c60506c79e4d0984d36735657b4b556dbbccb
SHA512f552eb3565b8e810416595f4a888359703cf5f15e0a30fa36f319cc35977f55195ca843896de6e1aece6b52a13b186587e78c3979c4a22865c5e613aa7c9ed01
-
Filesize
4KB
MD5b3a69003cb8bcfa0e096f283bc04a34b
SHA13d38544c20ef6f34cf0015cdbdda4cedf14b8210
SHA25617e20b14ba9baf221123ea0b8cae0214b24c9eb362327295599928b1da0ddc24
SHA51214339451190cfb94301dde3c5c5ea1ba0ed581fc80f931fa9265f0efabb2f9f2ce55daffe895a17041a0e65737ecacf08d64c2919c94f466dae7875502e67157
-
Filesize
4KB
MD5d5d43759092ddfe4d840fbbd431f3150
SHA1aab96a76f8c32b2db1f27eeee19b2d8e96feea2f
SHA256fdfe7a1055ccd11ab6799d4bfd3895c7283356369ae723aa0ea563196cb3cae7
SHA5121d32e564e46ef527f5bab56b095969af7453974890179a582b0e5a2593347d7d416d8633bc50fb6947734e2ce2bcf302600157e09afb90a579422dca41d9ba5f
-
Filesize
4KB
MD58dcb28c24d6682347cdfbee91f9f597f
SHA1eb716f9fa626c6260305884826ab918f23438ff2
SHA256ee22c76680893210623c2a9d7ad0c102b33f0b4c46473af263e752d7877f0a4e
SHA512661370a94278ab71b5b15fffd1ecbb26877d3fe9cfd8d831cb4e26d28241f420cd22ede42a675a05a4a5615c6c3a3f119db1259428e9a2b13480213c938e54ee
-
Filesize
4KB
MD5be74275fa53b2020a5e66c303abb308a
SHA10f93895702b43d02cb9c05989f30ce5657743bd5
SHA2564f7917272093a2323a947f0152953d7c1830c145c5f0e15b4e20b4082e491d15
SHA512791ab690273dfd7e0e5205b37169d10a3b2078a7e4e0e94a59a7f525e286ab197f91c261f564dfd3e6dd63ccf68e8512db25ce0583c7958d605888818fc3de4a
-
Filesize
538B
MD5305f2b2fd1a1c3a996d4bab694966c49
SHA1941e37bc673e35051ea0dd851d25e9760b70639b
SHA25600f642086c7cec5e1dbd96733134cf66029f841de4f27ee9fd56cc1b0b867c4a
SHA5121f8db6aa0ddba71ee4126f14c54b77ca37880687966edec66ae60124bfd41e9d394701209f1299c4ea11a307798981af8ad8dabe1e750f571e7a22277fcee279
-
Filesize
1KB
MD560233cbd47615c438ccb4fe330c9f7b2
SHA1820632213e5ceb8cf54c715b3f53bab58053cb10
SHA2561029d190b92ed2b85c15063cae81d630aa619fd6cd00627aa627482f4f279b82
SHA5120641d71e5664c9bf3ce3d1aa4c10b08d32a07f767e36860fa78ca25cfd6c7d3a2ec3c92292880d9b9a62360872f64b0cdcd0e1743b5eaa6da68a64daafc93b6f
-
Filesize
1KB
MD5fd00a48b27533fd8ab518546eefcfd41
SHA12268cd468850abeeefbf54fe0e1b703d94848bd5
SHA256524dc2010287ad2794e94c26e0a2c76e796811b2d92b090466599398e811b914
SHA51203f7a970d3b90802b43c84468359e48801c5b847f0f3eeebe345207c6a3c0114f54e6519a0510e92afe9e67a896f3bd28707962d0f2f759d200a21ec8cd6f71e
-
Filesize
1KB
MD558000fb1f0c41780d6d403b83dc3a693
SHA1df8f71255040562058dce7382e7d02e6e099dd25
SHA2562f285047764064236007ca0358df56325412ffd33b354209b2c87fad8c3f533a
SHA512ca98b750feba2ec7b166ad893033c22bba4c8df916873f78db9d63bf0f6897ad9bb0e994c5b223fa4e13515d20b207b476eeec560d46e57c176886d951e53eac
-
Filesize
1KB
MD5a0ee166d4dcc67665b945bc729891559
SHA162aa96a592a798789265000f9d19ff9e94a82d28
SHA2569966f276f247768383e3b29bc63a87b25795ba6c51607a38bdc2ad5d0d7b7a1f
SHA5128109d58fa7c256ed2ff1be4eaf28b6fa40a98b85a91e3c2d6126fcaa430736c3df3de1fec88dc5eea0195d95a6457793f3c90961a476181f5cae637ab09f1a9c
-
Filesize
1KB
MD5a5432cc392d0a34d4d694d4d06b29a85
SHA140647f1f08488ad39f688f95f7b6872e7747c0d4
SHA256806afc24482e86d6db4038d22f60ebcf8c2c9e208582778bbe48a3ce276e9c03
SHA512d633e056b6ab4515fadb4bbe1971a6bbda61b31fe7e2e1ca6e78bf83f26589a91e878da070db65a497b17c6298cc1402e9ea96537ec9868e8030555855cc5338
-
Filesize
1KB
MD5dd0b9662fb4d08af4e9cc1d17376d4c4
SHA1bf5ba4582bd27f8a37994f727896bfb77534d462
SHA256999803e0026fbbb49f2ea98416418cb84268812fa7c00ce1076f4fc03643873f
SHA5129c4468cf9f35fbf871950b3290e8ff20b4a7ca19a6830ac8a2725c621bf4241174567b6b4e31ea496fe2cbce7f3c0081972eb83bbb684c4d6f599f79174e0a0c
-
Filesize
1KB
MD57c7691f6180c5fea992ee84be2110c51
SHA1a280a52913fef54b0a19e322d153d674983382a7
SHA256abaa8c56a36aba778017f2778dba51d89c80965957d98c7eee24833711d36cee
SHA51219b1bc54bc4ce819b246c1d710a5b4cece7d96ff6390884e0c4d147cf926b66b67e7ff8386f0d6eb5edaa0cfc37d81ed4d8d0a2ad221470952ba2efe7259effb
-
Filesize
1KB
MD5fa29e3fb60c95dd6b675ad08cca21b86
SHA17043d57d09e8d611aee1f948b99e72f119fbff8a
SHA256f7e5dee59281ad7d42e3b913a23578863f208298261cbcecb4d6c4a72fa1373d
SHA5124421dc3f5bc4935b3cc3aa4e06121d8fccc9fd25d90837f51c18bc8be84156a12e5a48f0bf6ca60f14f1d1ff44c4d1e66a2b3d948bb310bb97a3f3febd5b9e9a
-
Filesize
1KB
MD5c59df76f1b4a5d01e0541db157ca51ad
SHA166c014b84b2a9860ab09a0565896b17326b1c2a6
SHA25640bb46b02033f5aa5095920cd5a1bd55a85676032817f1f94211be996bd7050e
SHA512f9871a92fbb86c441e0fc660720e748ba9e65142884e221f1a7511a3f7701fd8ccf5863cce0fa1bbb49dd145aa382ca1d1f04f0cacc7aeb1725b0b4806714639
-
Filesize
1KB
MD52193e9f106bcf339daca958fbac1b2d4
SHA1cd69d2fbe288e4c9e547e93c41e99330c456164c
SHA256e65a4eb777401deae9a2a27ea2ffb7903b1e74bca839bd7f879209234a1a5dbd
SHA512e6776c376d40ba05f213af24d7aeb0b7d773b2399be73a140a10aa35665dabd7a2ac43b953f18a7fe47ea017b0fe22e1e60bef0af0a762d20b40e018fbf1c373
-
Filesize
1KB
MD5ffadcda4e656c427faf593290de380f0
SHA1fc7008acb3c34f358a7d0782d6848ab67222829a
SHA25687831b4a948c5212a956abcb977f2f29c1fd53f78d54ca89717831b6d05725c4
SHA512adf00b401d7d6e05c8a377777aa8aa8b53bdf83d0650fb0f042405abe7f8dda28ed9ce2cf9ee7db8c1e381aa9008f8b1a5f675457c6028f7a22300eae61bf1c8
-
Filesize
1KB
MD5e8dc12dd850333c23f48ded4bc21c881
SHA1689774b6cf35047e39e4f137facfcccdc6ba575c
SHA25601c2295fe65ab897d6da37d9c553939b83cc3dbb6fef65b9350e18b91572a504
SHA512d1a5f043ac938089caec1648e501751fb67d4de61c10046e056793a885e99d806aa8f687bf6d242ca68deee1e6292e606acf1a773e937680054b6108eecf588f
-
Filesize
1KB
MD5987cfcab173e20b87fcd08d4cbe96ee0
SHA1f5db49f5a90228e3e980ac74a2ff06ba09b3ba3c
SHA256262f9da67e2a1b5ff232151396c274381d9c9792d75b9ff0dd25f102bf5b60e5
SHA5120b32c1e52177be3621c0ded4586110341296c0decc2ed188722505373edca8ea78ca1a5b7097f136bcfda039df898737bce47a631032cd0b7e10104fa224a37f
-
Filesize
1KB
MD55bc4c300e075bf7dcadef41ed8e61213
SHA1331570c14eb011ba70b4679c2ff24db08aee5b58
SHA2563d82608cf4cec8071f09d2c0cd874187cba1cd2f1b915a49da69975bcea77ab6
SHA512cf0ed304e2270ab4a2e553c97e30dfc14c555659ec4c9aa081d425fd5889cfeaa9fe4a97d243ea3d38003d6cca96eceb0334ff03a8e32f2e79c851591fffa83d
-
Filesize
371B
MD532ed67d2f030e4ad1bd332ef598a3a21
SHA166a4d8f207180fdea6cb92a6411bb486a8888038
SHA25633326765cbef5fcabd800ff2cc540e8e591a1b8e708e116b81aa6615be8cccf2
SHA5122d829b3d3297900c07f487f6f965a034dc6c2e432aeed20d37e7657557a272e3133dd4c452eff002a96bd63323729632dc5a02feb01a48eb314ead603c47ddb1
-
Filesize
1KB
MD5025c6dd60e35804baaf6121b29a46fd5
SHA1982559595c3ec413af638896d8e5571948809b47
SHA256b1c97048a6a76b5d2caca6807b69373383af22cb04df4171a0a17c6dacd638c4
SHA51287e00acd0a1d9453eb0ccdd7dd6d9c5f3f13c097ccc050c53e7926b03817d6a3ac435698def95687c7c05f931e9ce48fa4607ff99512f9156781c91455323634
-
Filesize
1KB
MD52b3d57f2c8b5a5bbda98457c0d7c24af
SHA110176fd659ad8c0407f283bfb9ebd32b926a91bd
SHA25647c1eaf5f81ac73206e6b9fc72b77497e9f591f43509ae6dbf1de8029a72ce14
SHA5127b02c4e64932d2d2deaec8d3fa01c45c0f42717f1ffc407292d740d8d27bbb1680b39dc89f55eeaa106184b4ea63b44018b528031c4aef9ca5ee2566d55ae186
-
Filesize
1KB
MD54dd08a04adb1acebeb37f4c83f09af91
SHA11a8656be6002d6d2f425b15e7b88a89691fc8e55
SHA2569595a04a2893d5dd3b369896e39ff3f3d7d95ea32be8bd2a80c8a603c7e08ba0
SHA512375e7883dcccfc87d0bd46cec3ce5b88a221a0c6ba1dfa7ab2e22dfa85345824c88d08e55dffc56622e934029426737acc5083e534c22c0c3283079cc5aa1248
-
Filesize
1KB
MD5d4149b08a500a3d334e84bde42f90492
SHA1f2b88a4004f4f9470867f86efd723cfffa93da48
SHA2562621f9c4ab83cf0154f744a70483c3fe255d906eda4246f090476ca39947725a
SHA512b61843f760c206c1213724cd6e0190bfe2f7c8723185c5e0d910614d37429085ad39c25f1deb660573a4f12db679222af563883692b127464ee8d7acdf28610a
-
Filesize
1KB
MD5b0fe5c9bbf3abe8c058930e3a41e2dcb
SHA101c60c48636a1c5a920c2c2bb025125ee62a88bd
SHA25678e68d8a3e77b76141cf90b3a1ae8d0bcb21ecca0a3ac37b70235944ab228b58
SHA51274eabe97fbc6b72871aee7f65adb744331d470ae80a092decf38aadc1b6e9901e4dea4af26102fce0a38df74466e5cb1f6751d9c4daa8fe36dac328a44f53e4f
-
Filesize
1KB
MD5b88de973e9781e9abde6cac13b2bb2f7
SHA13ac20b418f7a82dfd747bc196924662bf54211dc
SHA256ab93ec0422e9f85bf9c1e8f2960d748e2f106f2378c3a2dfc92e1e62cbb7fd88
SHA51287121c86ec7548c64d1162a81950cd64e024f735634498bce7de36cef2c8d7ce4350d7bec157c4e4e01ac547f9f5935b2f34a8490cfe8cf5a5e71e9b03434528
-
Filesize
6KB
MD5854c3708c605f0452289439267588a52
SHA1c777e999d78a63ca5288ed753f7a22bf63b77319
SHA2564e8c6de31e11daea93b42a3d280ea5ad00914f3c714d8342d5bcb04c170114c5
SHA512b757c7c86d5832319908a2a6cf13a328fd35183de370e158ceb8328262f962d2bc3171708bf215ac2a60f005a29641028ca163ca4b34edecbc7f16197d0ce7c7
-
Filesize
7KB
MD5277a2ebed2cadfb0fd2e2493a1d420e4
SHA12b25cd1866f4b555445d40bf3fa2d29381c210e3
SHA256692ef16ef5a449bcece2c39ef122e5af52438e38af76388a91d81caef70ae3d6
SHA51226ce0d53cae9270fa13b1fde69e52b7777d49912f68dd4b651318d615aa1d99a268e4bdec4e0ad5922c946a326c5c6eafd717d017a1430155ab8c922fc411b16
-
Filesize
6KB
MD51270c01547d207e02b1d678d30fbbfb5
SHA1fb8c1297960f14d67d10410d744f9abb44908300
SHA25692ff11231a59851c9e8879e6e8bbbbc678ea925630eae53759bdb031a213e7da
SHA51205fe9b607285ab4acb819c2674d0f105d29142efee02c6de664b285bcba4550645eadbc75830afa9034b2860e4c2a9d2e9654fbebd5ffe107fb2f3ff99503a23
-
Filesize
15KB
MD55973244340ccf2da4ba84c723ab0055f
SHA1d768a5c7e67d316761f5d613c1c386c54124c60d
SHA256a33b6641da86d8aa0416aa99703f73d68b4a394281fa512bfa2700dc86050d7d
SHA5129fdd9e19a95cfa1dd2bc7b10677db720ed62fd86269fa0c6f5dbe0579085b40f7bdec0ea5d45b8213756d70ae206ccec5101bd661627313394cfdaf83e1bd29f
-
Filesize
258KB
MD562a339db9322c0075cde334ef9f21bca
SHA134d4160457bcaa8f6ee0686e6b639e1b24956a05
SHA2565507d3241681d3f3eedb7b76ba6d0efeed5603d2bdc8bf1bf40f313fafb40745
SHA512001f17dc73504b127667c33b42ee8a6de5a4e55a50782285a886443357e0f0e83833f70bee463a01747f68e04e5efa054ac71d7ec293a3358aa3ab7c378c4a85
-
Filesize
96KB
MD5cc0c4822ef8fbaa5ccbf51179a596481
SHA1e95baad930b2be7e0f648d1531902cf158df3e58
SHA2567ed37b126b1de589f6755239cd7a8918fcd354cce15eb031333ef65a809c8252
SHA5124e5c290cfd3915eaaae7065a2efabe5a8f0a1130681e9474b2050633f3a67ef4f60f8d83f7da86b15349579f709ae3b0e9e2a0e5fa7300c7229c6e5aad44299d
-
Filesize
97KB
MD5bd77861d6b12c433205b4433ce845e6b
SHA1eeaa62f3b9b8ddddead0aa3387af44ddf298d8db
SHA2565fe09762abbfb41854c1653407b30e3c213a67f0c89bd23fd118ad6957f5348a
SHA5129fc216d6f4da652cdc7600ace1dade7e3f1c8ef6fb955b9e63e43f6bf17fcb1e130f0cf97b5432cd4b3f8a3e99401a564f98604aef72a5422499c28000d05cf7
-
Filesize
94KB
MD558705548d3a452c8d278637b87f163a5
SHA1db1ea608128182757d31116e4ede0fc966b946ea
SHA256b5c5e724a6b201245ce6ef7cdb4781742e7761f445a400ee959c9415770ad127
SHA512e25f687308aedad20ae20d0b4cdfacd89e9f060a1f5b7dc0f25fd277a2e1a9b740964ba1b0fef3a1fb14457bc4683e5ab3659f921a69731f67f1f9132244467b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84