Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-04-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe
Resource
win11-20240412-en
General
-
Target
c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe
-
Size
1.1MB
-
MD5
43ee675e00508da70a6ff56f176fbe16
-
SHA1
3ef1cf018e43b69f46dd4931133bfcfeb878ec9f
-
SHA256
c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296
-
SHA512
230c3c0139138dc6a529d0c73c562f5a701ef6a421688f647ce30b609cd92eb903bd4a7e2b2650e7a0b2de7bba537b534962f2276dea3fc91ccca641fae542e6
-
SSDEEP
24576:IqDEvCTbMWu7rQYlBQcBiT6rprG8auu2+b+HdiJUX:ITvC/MTQYxsWR7auu2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578904155755323" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1960 chrome.exe 1960 chrome.exe 3064 chrome.exe 3064 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeCreatePagefilePrivilege 1960 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1960 chrome.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1960 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 80 PID 1404 wrote to memory of 1960 1404 c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe 80 PID 1960 wrote to memory of 3540 1960 chrome.exe 83 PID 1960 wrote to memory of 3540 1960 chrome.exe 83 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 1220 1960 chrome.exe 84 PID 1960 wrote to memory of 5112 1960 chrome.exe 85 PID 1960 wrote to memory of 5112 1960 chrome.exe 85 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86 PID 1960 wrote to memory of 4240 1960 chrome.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe"C:\Users\Admin\AppData\Local\Temp\c59c2dbd55fa3b6019cf2c4095e2a8f8cafcd076cfdc46a5f63ac529d9389296.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd8ebfab58,0x7ffd8ebfab68,0x7ffd8ebfab783⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:23⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:83⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:83⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:13⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:13⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3628 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:13⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3240 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:83⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:83⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4520 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:83⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2404 --field-trial-handle=1852,i,685243546764106641,1732600462683826997,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD540c428ab9a5b79785c4b41daa72912b3
SHA163ec555cc326902b35994c9aa83463783bcd1923
SHA256599213750aad59fbd9ca005074f485865afa5ff688b4a50bd3c05c46f80de87b
SHA512473ab822627d5fabe5b0121633e55d66bb8aad6b1464fd035613b693b1957548d836a648959849ce7f76a17376d36088934fb8ba8e4bc2e2639a8037e19258b5
-
Filesize
2KB
MD554e11952c66d1cb53d594701e4d1e142
SHA121253b951cbeec2df7c75c3d79d87ba01d6927c2
SHA256052518dc192aee4de09de22bdc133728d2ec7f02954f016110d6444685580f79
SHA512ac4a285c9fc8a6c1ac8a786f60d25dca95893b902ec210335b41420413427b7ff4e43a2de04d86eaac81c57742c0b3d8a913ab482a06410bc8b9c325ea9ddfe8
-
Filesize
2KB
MD52812861cbd905e736607f7d21978cd84
SHA11d014fbf7fe868788131cbd3445611d7e4a46c60
SHA256d8b15af01305e2db3fc6a6df6457d111177869da2c9f41472a68f47cf763bfc5
SHA512344e1d040a728394cc3282d562ea6350e0d2d4197c6a58343506d869fe8ebae294b6da0e1e03a036473191cd55c8deb1c4b6337d731509fda83671b043e0e591
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5f08eb16f5085eb4e37e9f8c21c0d4114
SHA1c2b63eb04d5e82ce4aa9fd5f5af1f58f3de3835a
SHA256c14062d14508f118520c77f7c9d02b7b5cb7416cc85f485899568293acb33a24
SHA5127f0a384a495c4d923b48880ec3f6fa7daa6dd212d33688a01f9745d78c8e1a0b743ee435e2984971efcae2af1969fade13f805233f83f9dfb8823cc037b3ba85
-
Filesize
7KB
MD538049fc40164f0b6e0417762aa5d6da0
SHA1265a1ab1ae2539020b7ea0b3daf9f9b655b25b2d
SHA256d6ea7ba9743ed3900bc15c26898f0a7f55818d81e9c91feff7df116643656111
SHA5124c0ea8323b1aacd5f4f9d68d8fbc21f297761ca28232107b5a525a79b440d1481961e82b139d442694f3a98936cd33ece57b5239c13672f56f48235d2658adfd
-
Filesize
16KB
MD581a52e5a6a51e17e195e95e9e28bc572
SHA1cfac2d2008c3d4f9ec6febd378b3200673077ec0
SHA256d80318963770f6dde8091beb1b9f44148c9c5530c4b69d7b1acbc580426e3c80
SHA512f315ed2bd4feb1ed4e6a862da64953414df8129fc36a3a33cc0a1f313308d48df6a56770d6e46aa4153ac93edd92ed74ff0bb612b13de5f4032a821135fcd00e
-
Filesize
251KB
MD53f14b49db17c51ffa340e1f996b719f8
SHA19c6f296dc2b7173df55f6df4fd0ca25591355027
SHA256a57401696b7df3790e69859ffaf14d50216e6702a1e9941188a9a74dcc1d41f6
SHA512eceb4a0bcd2a7866d6ebf9b4bd98551b89bb17c9e0c9868962be7c788d0293f8cd96f48262210d52229c5fa637dd19c2d0e5fb25f54c7af44f5d6591e85833d1