Analysis
-
max time kernel
297s -
max time network
630s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
Timeline_1 (1).mov
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Timeline_1 (1).mov
Resource
win10v2004-20240419-en
General
-
Target
Timeline_1 (1).mov
-
Size
11.5MB
-
MD5
3914976e692378a7dae718ec3d8fc911
-
SHA1
fee984b29d32463420580ac7d9b354f21edb44e4
-
SHA256
7195736d327d3bd109efe831581c611a4fe4a3b7db0912b096a8c47f96240f9a
-
SHA512
3fe6c20b19625b6b88bf6ed0fbfb089ab68c7c8065a9b9a9ca12575bfdc0c577f292f9ce3de91e9153aab19573ca8f9bba5517b010d32a07bd046871990f5e66
-
SSDEEP
196608:cYigMiW5qLCwahsITG46GGfBDLUwVW5yzwXnmjTWqfCZER9YE4Htd32XWCmP0HSq:lVKqWhrTGRGYu5yAmjEqDYdaj2ASq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2236 vlc.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2236 vlc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2236 vlc.exe Token: SeIncBasePriorityPrivilege 2236 vlc.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe Token: SeShutdownPrivilege 860 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of SendNotifyMessage 41 IoCs
pid Process 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 2236 vlc.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe 860 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2236 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 1004 860 chrome.exe 31 PID 860 wrote to memory of 1004 860 chrome.exe 31 PID 860 wrote to memory of 1004 860 chrome.exe 31 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 2652 860 chrome.exe 33 PID 860 wrote to memory of 1608 860 chrome.exe 34 PID 860 wrote to memory of 1608 860 chrome.exe 34 PID 860 wrote to memory of 1608 860 chrome.exe 34 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35 PID 860 wrote to memory of 444 860 chrome.exe 35
Processes
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Timeline_1 (1).mov"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2236
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef78f9758,0x7fef78f9768,0x7fef78f97782⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:22⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1032 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:82⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2244 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1476 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:22⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2164 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3292 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3388 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3408 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1112 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2064 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2564 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1996 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3432 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2700 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2988 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3428 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=2528 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=2928 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=856 --field-trial-handle=1296,i,3050848264030163376,4836770155224894850,131072 /prefetch:12⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD54f2f087c7721c15edaaf138b477d1cb3
SHA11a509d9b177da7900d153e11b485e4e038677585
SHA256863e1f68718e44a62f791eaaf3c0654173b579ef4e44af9b7782d8f5fefc74e5
SHA5128fbcb358432e7f49ffe3b95176623057c396588bd9252ea6203edaad259d0e5efd267aeb418f452197d3efb43429244940e2b45ad50ec0cc4f31a612b9e67052
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5976763c946f932868b68197b36637804
SHA16877815a2d954672566a258fc666ecc03c2ab774
SHA2560049adbd14b70bbd8747f151194e130d619c3fc607b821c1e300f2ca638d3182
SHA5120cc72d1370ae005ff1a87ecf08892fa4bf919efaf6576189d87507e0286430183b1667cea038323002c049feeb26a8352514f3e8b7fd2a40814ee026402daecf
-
Filesize
5KB
MD5e9d7bb75c2835de752c5641289561fb5
SHA119b2cf1958ed3e7144f98c13a9d0ea3aa97fa588
SHA256a44c5e1a4afc2c3a668ca49f1d52f14b9188dffbcb6bb98222288bcbbc5b60df
SHA51225404e9faf5aea99e2ac95e747c3f6f288533391c395fd97f8da65b5d62f9fe30116e2cac3eeabd826d4f23fc509b918a9325f0fe85a1fcbfe6ca68ebe77cdeb
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
140KB
MD5915a83e76ce482ab1cb7ff404a272ed6
SHA1573e161d83a546eb3fc179a0c7a507b9a7c6b4e2
SHA256c5e3c5505f249d4e04017b4126867222205964f559ec1c040ab338b0d12e2c05
SHA512a8db0108a0d24f5d985791b75b0f26d7af822d637363a08035b4bfb4cd70de8da48bb203a592375a500b1d8cb1acaac418759ca0a341d4574bc8bc14a9304e21
-
Filesize
170KB
MD569f85c79dee11ef80dddaf81c1ff0367
SHA1da2a124193baec7187f75fa32194abb75826ede8
SHA256bfb3ad9e1cd4244c8cef46a67e993f79d7a3a70660af6532c656c2f457f42821
SHA512f52dc161acf8286396cb2e00029775adc4b6f9294913324b256814479a921f4d3b86cd1e8d95022b086e3332e681fa745178ac8261a2f30112ab8d0af4819ded