Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 12:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://104.248.24.43/favicon.ico
Resource
win10v2004-20240412-en
General
-
Target
http://104.248.24.43/favicon.ico
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584357862834808" chrome.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 2856 msedge.exe 2856 msedge.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 5472 chrome.exe 5472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe Token: SeShutdownPrivilege 2060 chrome.exe Token: SeCreatePagefilePrivilege 2060 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe 2060 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2904 2856 msedge.exe 89 PID 2856 wrote to memory of 2904 2856 msedge.exe 89 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 3036 2856 msedge.exe 90 PID 2856 wrote to memory of 1640 2856 msedge.exe 91 PID 2856 wrote to memory of 1640 2856 msedge.exe 91 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92 PID 2856 wrote to memory of 2316 2856 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://104.248.24.43/favicon.ico1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x74,0x108,0x7ff8522546f8,0x7ff852254708,0x7ff8522547182⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5053750302291602144,18032316247546421687,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵PID:5780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2060 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff84037ab58,0x7ff84037ab68,0x7ff84037ab782⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:22⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:82⤵PID:5180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:12⤵PID:5300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:12⤵PID:5312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4324 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:12⤵PID:5604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3972 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:82⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4608 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:82⤵PID:5676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3648 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:12⤵PID:5888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:82⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5000 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:82⤵PID:6080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:82⤵PID:5124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3620 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:12⤵PID:5704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2364 --field-trial-handle=1936,i,5147985669434861397,4998594510426134454,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5472
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5e4150a5e20c39766159828d9a6df8bcc
SHA12e1bae743dd23d2d70c1db32a3b1445b5f003896
SHA2567013ed19de35788ab408736103f06aef22d70f204c5851b4bb17c5eca29cb60b
SHA51289b3fcd0d9759b75b2489f1bf41e0679bd7014e6cddd4db523a3a0c8c1fd1a1fb64da8bce0feaa8a923a4a0c705c8088b6060aa0ee5e8b88918985806f95a533
-
Filesize
2KB
MD5e6fd3b5eb59f2efeb80e4cdce3ce85e3
SHA1c3d2c2f84a83c5f8753b7346ed0b1b8fd8f08aa0
SHA2567114a199f40945c401f0d1796329d4678a491a947cf5b64b171bf6f903e233a7
SHA512a6e239e7e1f79ee06d18a0782a116d264b7ea9cd64eada3bdb7ff02b3be199131fd70f21ecdd743e423ee67ca0e7d0a159e970118f31de3c6a582db828d027e4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD505a1ff895d2d82a8c31223371e73a2b4
SHA17049efedb54b77f383d4d98b6d0ba999f08cfd22
SHA2566f665114edbda4d5deedca8a19154d8cb60f6a1537e017e525441382930d0283
SHA512d88ba806d2d847a8b033195d726cefd09440ceab1af2cd58efbbce97c32e0f58ddd229890012fe8bfa64cd416f9fe2be9868986a25c2cc85b16ca37eda1a2db7
-
Filesize
524B
MD5b925fff0b1a8fe67b684504e87b6d7fb
SHA152ca4f8b9e292b36f12cd3e3459bd9022557d88f
SHA256b53ce1be8d716aef79621a7c2f4994826c51612322bbaffa74ae3f82f89b3c97
SHA512adae1e215d32d018f0364c69447a8fdfc367e6e296f8cb2ead2e90931f4e9ab9a3331c833628c6a6dc3c29c00917d067e80ccc5b799111083c79aab7979c3286
-
Filesize
7KB
MD5104643b81ec6d5b8bd2de1e169a664c1
SHA1b7559d3bdffe5722f4a94ab14afe402cc322bbff
SHA256dd3963e8d63293625e369e5066a2f29c7b529f32860de5c985f8a9744c80f9ea
SHA51255f406647e244ceb8ba1455e8200fd257a86eafc990c4efdd723201bbe2f0f3feaac754c667bc47eff22b8cf95aa6173c31ebc8c5bfd03d6c0937dee0f8fae75
-
Filesize
6KB
MD5c7a4cc490dedddb15ae6567c267f643f
SHA1bf144e090b8a01f2f96c7edbddd53159fe287958
SHA256a6b919a241951c3ff41b268dd781c4a449601f4513dd36a0eb10d22e90d0390d
SHA512d2034534de0a439f89574b92b39a25960ade7085bd857208e7f5d4af776fb076bc3a8870e8df7e44a421640fbf35ab5e2152d0c7687cc74bf4909b56396f1aaa
-
Filesize
16KB
MD596565ea9e5cde6511fa2f08c8f4e15ab
SHA1a6f9523e4c403fbd4d23603cbe423e5056810871
SHA25624b5850f622e7aa666ed77d59a2e557114f467e5d58111701ed1c1b5b501e3bf
SHA512a78cc9033262292961ee9ce677eb1354fce9835e74a29e05c02979e015e1a7876700cc8ccc991cbfd45418bbfea1a8319aa17acb7b2bdfb6a8ca37ecd94db555
-
Filesize
252KB
MD552ca6891cc476cc3a865930a1f89dc43
SHA1f461a3d6fa4a742604b34b8501d4421241197972
SHA256f736e134057079e7f8cea23de53f9d86be63cb9a1ba3034c682ef75db91ce404
SHA512dbfd6490e2ba7903bb89de63495fe5fb8e1d09b8f190a99c4acc1b26c82b8c0f1b327638b48f6713a3f8c58d293f29ddb1a72c6aa65464f5842d45ff6cad654c
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
6KB
MD52b3a9599eb28af269ec46531b7adaf48
SHA1fd8c20ca8bed90b7c157ed0d8755f91a54135788
SHA256d75f7a9abf9e4ff85ae743dfe6e3851375433b170a889380b982d86ef000d5a3
SHA5122128dde2b196d0b753e2c580d3104919b2ab64985538b76eb62cfbd39df1228140b00a46a4e6427d82b84844a06f732a4ff98c76f13cac626cd5cb7915dec697
-
Filesize
6KB
MD525ff362e272fb62fea9f951e7768319a
SHA101ce9a09c1845dc6c52c4786835a1e1400d26f7b
SHA25669fa592b305102df5c592bd55a81c1a11bf89aa28edcef2917d82cfce2f29285
SHA51253bca1f964b215a5cb9babceef4456b5cfd276edaf98f86139e26ad808ca1aa3ab9fce94ffb58bbd96e7ccd79525a020bab9e654a289cf51e4de4a039d53c52f
-
Filesize
6KB
MD5d70516eaec7544a35c9d76405fe78904
SHA124162fd8659a592ba3a32cd4208e4503effb67dc
SHA2569c5b36fa343050fb42fe127be70b3fcb434e1ea5bf477ff4542aff1d6666a994
SHA5126444f1308355ad8d41559a522dd980d0917a60abea2e0f99cd26e5c073922a801283089215b1f3c2cd8b7cd23db327187d2d41c81964c3cd56bc83a11c34653d
-
Filesize
6KB
MD5cd02ca78acfafffba3bcdb948fdda0a1
SHA1db5ac8607a061e4c2f2b7c47bd279692b70ce729
SHA2564dc999cb517fbd31ed5b4647f22f2051f7d96a9350cb661a7d550eb466dc897b
SHA5129ce4041a27f27d2f058697c680511c8b67ab5a275b7a8c2842a37372bc7e1fc80c4408bc6bd122642a636db4c4beae547c3aa19606328284d5181ce7762f43f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD500ace88c14e0ae46b22985efae559a3b
SHA1a335b1d57cfd0d7f4e24d0ed6da100603ab2efc1
SHA2567e752811f62747a2f182a5ca0e6acd95ea6e45b17ea472047eb2fce06e5a2df8
SHA512562dbed6f2195bac8cfc9c2cd9d885fe89bb6c484181b783d8303c2a223b7b4f208b9a386293092e6800f10b5168fa95acf6f21021b5027cd016fc019b0a0964
-
Filesize
11KB
MD5ce4dd5b5945febe25ff230d232b03b03
SHA155f662f971be9f3f9cc6cd24c148566782dc14d3
SHA256f57a3ba5d78dff468078bd34b2d558021096b241abfa5a348fa98d886cb96308
SHA5127d479a38b2da802c71a81916672fb76ad78f3fe6763cb60be65be43fbaf4d9844c5559ec6a432de76207860530b01c30979a9c5884162345eb6002e5cede7c8b