Analysis
-
max time kernel
299s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 01:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://id.atlassian.com/signup/welcome?token=eyJraWQiOiJtaWNyb3Mvc2lnbi1pbi1zZXJ2aWNlL3J1dW5vcHBkbThjbHBoaXQiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJsaW5rLXNpZ25hdHVyZS12YWxpZGF0b3IiLCJzdWIiOiJhbXkuc21pdGhAcWFudGFzLmNvbS5hdSIsIm5iZiI6MTcxMzQzNDA4NSwic2NvcGUiOiJ3ZWxjb21lIiwiaXNzIjoibWljcm9zL3NpZ24taW4tc2VydmljZSIsInJlZGlyZWN0VHlwZSI6InJlc3VtZV9taWdyYXRpb24iLCJleHAiOjE3MTQwMzg4ODUsInJlY2FwdGNoYVNjb3JlIjoibnVsbCIsImlhdCI6MTcxMzQzNDA4NSwianRpIjoiNGRiZDRmNmItMGIxMi00ODk0LTk3NmQtMWE0ZDU5M2FjODI0In0.ASShIM_lSiasRte7QDyFW4OakTcD6JwkuB0gThz4ttsVrNHqkNtplkfGNICp_SKQ7_wkw454sgYVGPh31tO6CeKl8y6seDLXIGcB4M10fDHa4WXVk2CbiLWX1d4w6umyaLmbEcHwk-Mim1befx5OP3W97rPQqInyzkA4Erk_qQTyPCbpvCFsU9q-rzD46ULwq8lQAoJWztUN72Rnaou_1gUlNxi7RTCJ8Byci91_XYv3bv9u_R2lmH5Lg5tTxDKzpySdJMgKGiycwHbCoeZIU05VOEDDCpja8yN_uF4i14jTaO0yee8_H9ASxCM5a9slUw0H66tLo3pQ5Q_PNoKHBg&source=f27c2f50974749ac8ffe229ba04f9564
Resource
win10v2004-20240412-en
General
-
Target
https://id.atlassian.com/signup/welcome?token=eyJraWQiOiJtaWNyb3Mvc2lnbi1pbi1zZXJ2aWNlL3J1dW5vcHBkbThjbHBoaXQiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJsaW5rLXNpZ25hdHVyZS12YWxpZGF0b3IiLCJzdWIiOiJhbXkuc21pdGhAcWFudGFzLmNvbS5hdSIsIm5iZiI6MTcxMzQzNDA4NSwic2NvcGUiOiJ3ZWxjb21lIiwiaXNzIjoibWljcm9zL3NpZ24taW4tc2VydmljZSIsInJlZGlyZWN0VHlwZSI6InJlc3VtZV9taWdyYXRpb24iLCJleHAiOjE3MTQwMzg4ODUsInJlY2FwdGNoYVNjb3JlIjoibnVsbCIsImlhdCI6MTcxMzQzNDA4NSwianRpIjoiNGRiZDRmNmItMGIxMi00ODk0LTk3NmQtMWE0ZDU5M2FjODI0In0.ASShIM_lSiasRte7QDyFW4OakTcD6JwkuB0gThz4ttsVrNHqkNtplkfGNICp_SKQ7_wkw454sgYVGPh31tO6CeKl8y6seDLXIGcB4M10fDHa4WXVk2CbiLWX1d4w6umyaLmbEcHwk-Mim1befx5OP3W97rPQqInyzkA4Erk_qQTyPCbpvCFsU9q-rzD46ULwq8lQAoJWztUN72Rnaou_1gUlNxi7RTCJ8Byci91_XYv3bv9u_R2lmH5Lg5tTxDKzpySdJMgKGiycwHbCoeZIU05VOEDDCpja8yN_uF4i14jTaO0yee8_H9ASxCM5a9slUw0H66tLo3pQ5Q_PNoKHBg&source=f27c2f50974749ac8ffe229ba04f9564
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133579624019182731" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4084619521-2220719027-1909462854-1000\{B85862B7-BA06-4FA5-A9A7-8396B3FF2655} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 2340 chrome.exe 2340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 2392 3524 chrome.exe 88 PID 3524 wrote to memory of 2392 3524 chrome.exe 88 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 1060 3524 chrome.exe 89 PID 3524 wrote to memory of 2940 3524 chrome.exe 90 PID 3524 wrote to memory of 2940 3524 chrome.exe 90 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91 PID 3524 wrote to memory of 3388 3524 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://id.atlassian.com/signup/welcome?token=eyJraWQiOiJtaWNyb3Mvc2lnbi1pbi1zZXJ2aWNlL3J1dW5vcHBkbThjbHBoaXQiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJsaW5rLXNpZ25hdHVyZS12YWxpZGF0b3IiLCJzdWIiOiJhbXkuc21pdGhAcWFudGFzLmNvbS5hdSIsIm5iZiI6MTcxMzQzNDA4NSwic2NvcGUiOiJ3ZWxjb21lIiwiaXNzIjoibWljcm9zL3NpZ24taW4tc2VydmljZSIsInJlZGlyZWN0VHlwZSI6InJlc3VtZV9taWdyYXRpb24iLCJleHAiOjE3MTQwMzg4ODUsInJlY2FwdGNoYVNjb3JlIjoibnVsbCIsImlhdCI6MTcxMzQzNDA4NSwianRpIjoiNGRiZDRmNmItMGIxMi00ODk0LTk3NmQtMWE0ZDU5M2FjODI0In0.ASShIM_lSiasRte7QDyFW4OakTcD6JwkuB0gThz4ttsVrNHqkNtplkfGNICp_SKQ7_wkw454sgYVGPh31tO6CeKl8y6seDLXIGcB4M10fDHa4WXVk2CbiLWX1d4w6umyaLmbEcHwk-Mim1befx5OP3W97rPQqInyzkA4Erk_qQTyPCbpvCFsU9q-rzD46ULwq8lQAoJWztUN72Rnaou_1gUlNxi7RTCJ8Byci91_XYv3bv9u_R2lmH5Lg5tTxDKzpySdJMgKGiycwHbCoeZIU05VOEDDCpja8yN_uF4i14jTaO0yee8_H9ASxCM5a9slUw0H66tLo3pQ5Q_PNoKHBg&source=f27c2f50974749ac8ffe229ba04f95641⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb7076ab58,0x7ffb7076ab68,0x7ffb7076ab782⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:22⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2172 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:12⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4252 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:82⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4268 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:82⤵
- Modifies registry class
PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4552 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:82⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1008 --field-trial-handle=1868,i,1546263454477727813,11865046044093411004,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
Filesize
528B
MD5c7eb5c5f644f0020b6444a25ee5f4884
SHA1c5dd898cb393e74853785401a2e443406df29dfc
SHA25680fb0eeef2fcf41081e14e161a3f6f5fc336e4b9111c222f6b1246c0cc2749ba
SHA512e4eda7e1d444f2733e050375c85f47200bf931e994dbef12f82eb31f32576cf6d379df638d323e72a04a49062186419486400d5f3176ebeb52363ad904a87468
-
Filesize
2KB
MD5af36f436d1395980f9f628f2c827f327
SHA194ac485d9b243d3f30810a4762a0fd17dab44b23
SHA256fd0bbc2567d929ab3d8ed280ae33898712f9474c3b0f68f6af5bdc04a39cb7bc
SHA512c7f6bc3f058e186ab908e3750044730831aae0fd7bdadb29b816514651d7691d08c66b9c3047abc0bd7878fb4fa81f8ba59429a2436c9b63a46fb097cca250ea
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD500272abee500460dfca9aed95753d098
SHA1eeda754259b7d2d9d7ec4c67fe62a55d8d809c3b
SHA256edaaf175df73e88ef2b3d84d9396ead4e98ece61dc89ed81589576547ed1d2de
SHA512c23644af8d02da31f0a959e013052d3ae2516d34bdccde89af87da3a7c53899e9ac31883cb1693ccbc82b079b8a772eac1a65fcc1c40b00df10ea48f529adf72
-
Filesize
7KB
MD5709f7a9333fce8868816da1650f88da5
SHA1c84e26ab4345bacc2580a0d92b80f85e219de81f
SHA256f66ee876be10d5ff204b777b25d28bf5e19dcbfd3034f68ecc5c71e47ebe7c01
SHA51274d71addd112095cfca857aa244caa82dfb9cae0ff134925d3b2b7df323b2ffd47863de9d24d595e239879a1534868e530cefce71569cf153756528e456f39b3
-
Filesize
127KB
MD50bb261802b7568113d0ad19028516498
SHA14b25d33918e2de653281cdddda0f6a3dc5ed02a3
SHA256cbc46dddabf2517d5a500c68621aca0917ef489e4e5b5c21ee2c79b1df9ab054
SHA51292f37ac72d3bda4eed789bcd92a1acf443dd37284fd629157667eddf9014446cd2247e6104b1ea977730663ee5514c4c1efe6d9cd843c88477111e530e6ae50f