Overview
overview
7Static
static
7Hone - Installer.exe
windows7-x64
4Hone - Installer.exe
windows10-2004-x64
4$PLUGINSDI...p.html
windows7-x64
1$PLUGINSDI...p.html
windows10-2004-x64
1$PLUGINSDI...x.html
windows7-x64
1$PLUGINSDI...x.html
windows10-2004-x64
1$PLUGINSDI...app.js
windows7-x64
1$PLUGINSDI...app.js
windows10-2004-x64
1$PLUGINSDI...uts.js
windows7-x64
1$PLUGINSDI...uts.js
windows10-2004-x64
5$PLUGINSDI...dle.js
windows7-x64
1$PLUGINSDI...dle.js
windows10-2004-x64
1$PLUGINSDI...min.js
windows7-x64
1$PLUGINSDI...min.js
windows10-2004-x64
1$PLUGINSDI...ons.js
windows7-x64
1$PLUGINSDI...ons.js
windows10-2004-x64
1$PLUGINSDI...ics.js
windows7-x64
1$PLUGINSDI...ics.js
windows10-2004-x64
1$PLUGINSDI...nds.js
windows7-x64
1$PLUGINSDI...nds.js
windows10-2004-x64
1$PLUGINSDI...ies.js
windows7-x64
1$PLUGINSDI...ies.js
windows10-2004-x64
1$PLUGINSDI...ate.js
windows7-x64
1$PLUGINSDI...ate.js
windows10-2004-x64
1$PLUGINSDI...der.js
windows7-x64
1$PLUGINSDI...der.js
windows10-2004-x64
1$PLUGINSDI...ils.js
windows7-x64
1$PLUGINSDI...ils.js
windows10-2004-x64
1$PLUGINSDI...ler.js
windows7-x64
1$PLUGINSDI...ler.js
windows10-2004-x64
1$PLUGINSDI...ate.js
windows7-x64
1$PLUGINSDI...ate.js
windows10-2004-x64
1Resubmissions
11/04/2024, 06:06
240411-gt1pxagh4y 711/04/2024, 05:53
240411-gllk1sdg28 711/04/2024, 05:51
240411-gj89asgf81 711/04/2024, 05:48
240411-ghl3dadf69 711/04/2024, 05:44
240411-gfgpwagf3y 711/04/2024, 05:39
240411-gcnn1sde52 7Analysis
-
max time kernel
88s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 05:39
Behavioral task
behavioral1
Sample
Hone - Installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Hone - Installer.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/app/cmp.html
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/app/cmp.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/app/index.html
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/app/index.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/app/js/app.js
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/app/js/app.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/app/js/libs/jquery-1.10.2.min.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/app/js/libs/jquery-1.10.2.min.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/app/js/models/notifications.js
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/app/js/models/notifications.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/app/js/utils/analytics.js
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/app/js/utils/analytics.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/app/js/utils/commands.js
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/app/js/utils/commands.js
Resource
win10v2004-20240319-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/app/js/utils/cookies.js
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/app/js/utils/cookies.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/app/js/utils/modal-events-delegate.js
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/app/js/utils/modal-events-delegate.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/app/js/utils/strings-loader.js
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/app/js/utils/strings-loader.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/app/js/utils/utils.js
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/app/js/utils/utils.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/app/js/windows/cri/cri-controller.js
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/app/js/windows/cri/cri-controller.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/app/js/windows/cri/template.js
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/app/js/windows/cri/template.js
Resource
win10v2004-20240226-en
General
-
Target
Hone - Installer.exe
-
Size
2.0MB
-
MD5
67d529ffa7aef6629700ce3a9e990ac2
-
SHA1
6ba55f541defc22f92473a45d2187848a0d4126a
-
SHA256
bcc8812a2385f7a4db7d7633eb5ce0770e5cc3b5093873fd3e0a7c239f8daa1d
-
SHA512
bdda91b0d95292ddae966754c6b3af618b60f4e575033306023db5e923b4a422b7a82bca1974645a15d8631221f7e4cacb399a34737c2c1f1961416c74ae7c64
-
SSDEEP
49152:6Dr+mxE87vxpsrFpIvPBDurAaMs/Y6NTTCca:6H+4PN+TIvyMZ+O
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1444 Hone - Installer.exe 1444 Hone - Installer.exe 1444 Hone - Installer.exe 1444 Hone - Installer.exe 1444 Hone - Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 chrome.exe 2904 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe 2904 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2960 2904 chrome.exe 30 PID 2904 wrote to memory of 2960 2904 chrome.exe 30 PID 2904 wrote to memory of 2960 2904 chrome.exe 30 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 1460 2904 chrome.exe 32 PID 2904 wrote to memory of 2100 2904 chrome.exe 33 PID 2904 wrote to memory of 2100 2904 chrome.exe 33 PID 2904 wrote to memory of 2100 2904 chrome.exe 33 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34 PID 2904 wrote to memory of 2544 2904 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hone - Installer.exe"C:\Users\Admin\AppData\Local\Temp\Hone - Installer.exe"1⤵
- Loads dropped DLL
PID:1444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef74e9758,0x7fef74e9768,0x7fef74e97782⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:22⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:12⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:12⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1384 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:22⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1384 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:22⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2216 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:12⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3452 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3548 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:82⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4012 --field-trial-handle=1248,i,6531978947918904825,16380424306340652311,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
361B
MD5875494afcea7c343b517aed8ace001ea
SHA1a83c3194b3d097817a730042c8ff7beadf4ee61e
SHA256c4798a25d14f95cf2ba397714fb391356f9269a104f1e28a5764dbdc5f274a63
SHA51217dee82c89928c3b8c630d7fe9426611c2089679dc9160946481b46dd9c03d122138bd934f430bcbb1f19d4ddf2d75a956b90991c27f8af0337d342efce46f37
-
Filesize
4KB
MD532fc3ef750abef579b79b2a10c187cc7
SHA15512e0f40ab55e9275b8b86587cc9558a3159a53
SHA2568d9c1bffac705fa2c2974543781ef91aa7981b9e836b2c7d63e43880d9cdbfbe
SHA512cd946f23baaf7a59ab68371eba92208a982e44973f1038d1ee2bb858d2055d36c2135448fdd42bfd40a18027090f5346d4a67444354170675271bcf427ca2ceb
-
Filesize
4KB
MD51f5c1f524a48a3fcfb2415be04c6f004
SHA17524e04f99235adfbcd4d834d2ddf53bad2528c1
SHA256caea4e32f3b26d4d4e9bf6406428382e8b9f20ede44a61f39534b4b844654117
SHA512473a88cf3290117672496e3ae5a6883c85a35147db1bf3976e879ee7f0a1e0a5629280be7dd70fff622c03b4d529b9f0e03e6b9c57e9ea7c018053c75cc7d8be
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
11KB
MD57399323923e3946fe9140132ac388132
SHA1728257d06c452449b1241769b459f091aabcffc5
SHA2565a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3
SHA512d6f28ba761351f374ae007c780be27758aea7b9f998e2a88a542eede459d18700adffe71abcb52b8a8c00695efb7ccc280175b5eeb57ca9a645542edfabb64f1
-
Filesize
4KB
MD59301577ff4d229347fe33259b43ef3b2
SHA15e39eb4f99920005a4b2303c8089d77f589c133d
SHA256090c4bc8dc534e97b3877bd5115eb58b3e181495f29f231479f540bab5c01edc
SHA51277dc7a1dedaeb1fb2ccefaba0a526b8d40ea64b9b37af53c056b9428159b67d552e5e3861cbffc2149ec646fdfe9ce94f4fdca51703f79c93e5f45c085e52c79
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
55KB
MD5aad3f2ecc74ddf65e84dcb62cf6a77cd
SHA11e153e0f4d7258cae75847dba32d0321864cf089
SHA2561cc004fcce92824fa27565b31299b532733c976671ac6cf5dbd1e0465c0e47e8
SHA5128e44b86c92c890d303448e25f091f1864946126343ee4665440de0dbeed1c89ff05e4f3f47d530781aa4db4a0d805b41899b57706b8eddfc95cfa64c073c26e2