Analysis
-
max time kernel
147s -
max time network
255s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe
Resource
win10-20240404-en
General
-
Target
f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe
-
Size
1.1MB
-
MD5
1d0d1194b728e7f76f62aa1e09780fde
-
SHA1
3a7c0abfaed7785ddb57e2a4b7c0a67097ef511a
-
SHA256
f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88
-
SHA512
d88686711c5594e5e2314eaf27dbb3f7ec8a1e77d8cce8743149a2feb191d25f13ac480d3dc41bd6f89860d1fe7a2542874224b46ee42051d690862bef468568
-
SSDEEP
24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8auU2+b+HdiJUX:sTvC/MTQYxsWR7auU2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2592 chrome.exe 2592 chrome.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2592 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 28 PID 2276 wrote to memory of 2592 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 28 PID 2276 wrote to memory of 2592 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 28 PID 2276 wrote to memory of 2592 2276 f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe 28 PID 2592 wrote to memory of 2892 2592 chrome.exe 29 PID 2592 wrote to memory of 2892 2592 chrome.exe 29 PID 2592 wrote to memory of 2892 2592 chrome.exe 29 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 2432 2592 chrome.exe 31 PID 2592 wrote to memory of 1896 2592 chrome.exe 32 PID 2592 wrote to memory of 1896 2592 chrome.exe 32 PID 2592 wrote to memory of 1896 2592 chrome.exe 32 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33 PID 2592 wrote to memory of 2520 2592 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe"C:\Users\Admin\AppData\Local\Temp\f43235fceaf25b4068f4a3598a99f695c12912625647b80ae88cb6311bc09c88.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7009758,0x7fef7009768,0x7fef70097783⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:23⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:83⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:83⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2172 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:13⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2180 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:13⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1192 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:23⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1244 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:13⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2324 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:13⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3476 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:83⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3884 --field-trial-handle=1356,i,377875430389889204,5935559325375669272,131072 /prefetch:83⤵PID:2792
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5b87204c979780b5e58888f0a56edc0e4
SHA1b03b010e5025b33e73bcafd00dd25f345e3ff37b
SHA2560585f05d1219bb5bae15ecf2cd5845a6c4a8adfcd1770c6e12f95f2019357033
SHA5124b4b0beacdd8a89fcb58fe5b998ae254c1ab61087d45d3df023bca85030e4082d9b7e441c2f7cfefb67f535015b8b55008184f1dac91b8fc342227b53cf417e2
-
Filesize
2KB
MD5b304347cdc685301e200fee026dab0fe
SHA14d8d1ef006f319bf820b56ec7b0206b00e2b0e37
SHA25655068cf82b1acf2e16937f70e65f1f95b5448f89c937b8799f3b498e936e0efa
SHA512ece7e83dcf4ddd8ba2e75709b52f3f024af64e7331b68bb4d7f16218d272c2c00a6ec77d26675c6cf6fd1c980332e1b9b74b6f5e19fff58bcbcdf6853953e196
-
Filesize
2KB
MD5bc21e1731e2287fbcb9187cd57c4c24e
SHA1a898e678c021b1fc3dbac6cd8c1314e07c5aef70
SHA256e63bd4d866a40747869b4bbf336b8547376625b2b5790ff74a2db9344a294500
SHA512ce01f0d8504e819f3450032284b79f9ba8011e3bd5ee6e9e41ea535eb302b2ce3b040e057e0872dfe835c61b6345992d9726eef99801ee35a4f22699c937d453
-
Filesize
525B
MD55e9ec9de53657bcd3ad964d8f669c292
SHA1467b0590a9f81bc97d74973d4dc679bdbd557e19
SHA25637dab421fbfa293b1b90dd286d2a92c1191d82c32591d082085dfb61101aee1e
SHA512493d15d63d18e9c2a5b3a677d8bbc5c26db61a6a0cb4684ba022d24b2b4d8a63ed5ef068a7c06cd6353d0de6a78b282c64058566635851710936e2b93f844585
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity~RFf77360e.TMP
Filesize525B
MD57442ebbfff0cb5daaca14cf50f82af41
SHA17e7c07af73524ae18eeebd0ecc63a8400e08a733
SHA2567489db0423e7154d24d7e24bf0d0651357e661c44a6bb55db9837b5f30301a35
SHA512820ac3d6f16db02f25d467f1d8b933dd0e419660bcadbf8c4d07c061c4908cc593a67e8854f65b9e92e5214dcc2c068ff28afe448455df80d011fa1c8991a1f7
-
Filesize
6KB
MD5c327750e88580cc48bb0d3bc7532607d
SHA1449f6f9d9d0e203d65f558bc9a81e2ba3f1601e0
SHA25665004b58730d3107e811db8842464fec7150536eb0cf27412a78582d2855108a
SHA5129a8a664c6913156d4ccc2693eee216b96a6ace21890036ef36f7d5d8ca540a130ac125679ae0cc72df8fc7a72bf372fbe08a572f84be569c42a74fd46fe3eb5a
-
Filesize
6KB
MD5af3f49575be255dd47dc35263a893769
SHA1213c100e019a879a7f4ccdddf0161876c6468aad
SHA2563f96fee212ad5c953b1ba5faeac725ede825c2197e30a754b26e497d7ad45760
SHA512cecb7459d182cd40ba5e8202674152d767d156b854372d47141df7e33a332b1bbacf7520212cf989e272e3c89bf67bdff3c3c9068568fb236fe4cfc8beee5e71
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2