Overview
overview
5Static
static
1Machines _ Triage.eml
windows7-x64
5Machines _ Triage.eml
windows10-2004-x64
3attachment-10
windows7-x64
1attachment-10
windows10-2004-x64
1attachment-11
windows7-x64
1attachment-11
windows10-2004-x64
1attachment-12
windows7-x64
1attachment-12
windows10-2004-x64
1attachment-13
windows7-x64
1attachment-13
windows10-2004-x64
1attachment-14
windows7-x64
1attachment-14
windows10-2004-x64
1attachment-15
windows7-x64
1attachment-15
windows10-2004-x64
1attachment-2
windows7-x64
1attachment-2
windows10-2004-x64
1attachment-3
windows7-x64
1attachment-3
windows10-2004-x64
1attachment-4
windows7-x64
1attachment-4
windows10-2004-x64
1attachment-5
windows7-x64
1attachment-5
windows10-2004-x64
1attachment-6
windows7-x64
1attachment-6
windows10-2004-x64
1attachment-7
windows7-x64
1attachment-7
windows10-2004-x64
1attachment-8
windows7-x64
1attachment-8
windows10-2004-x64
1attachment-9
windows7-x64
1attachment-9
windows10-2004-x64
1email-html-1.html
windows7-x64
1email-html-1.html
windows10-2004-x64
1Analysis
-
max time kernel
68s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
Machines _ Triage.eml
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Machines _ Triage.eml
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
attachment-10
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
attachment-10
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
attachment-11
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
attachment-11
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
attachment-12
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
attachment-12
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
attachment-13
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
attachment-13
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
attachment-14
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
attachment-14
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
attachment-15
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
attachment-15
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
attachment-2
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
attachment-2
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
attachment-3
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
attachment-3
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
attachment-4
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
attachment-4
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
attachment-5
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
attachment-5
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
attachment-6
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
attachment-6
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
attachment-7
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
attachment-7
Resource
win10v2004-20240419-en
Behavioral task
behavioral27
Sample
attachment-8
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
attachment-8
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
attachment-9
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
attachment-9
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
email-html-1.html
Resource
win7-20240419-en
Behavioral task
behavioral32
Sample
email-html-1.html
Resource
win10v2004-20240426-en
General
-
Target
Machines _ Triage.eml
-
Size
281KB
-
MD5
0343083468a1c764d721a0471eb0a069
-
SHA1
44a2cc77f27a4a1b84d275dbffc6cc8ee95c63a5
-
SHA256
4dc68dedcc7c4a4bfd948ef3bd877203500ee65b56254058b5c55f866999e4ee
-
SHA512
1e556ae8e3e014767e17afa96cae22a1bb0a3f9d5f73174bdab351971d5a37374edc65d9d14b19282dd0fc4e6ec8a5cfe10e404c05ad5c98d1996ddc3eb6c14f
-
SSDEEP
6144:VRyi0DVXhmfq6H04Ti1vfVkC9uE/bUTS9:88M
Malware Config
Signatures
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2304 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1020 1688 chrome.exe 29 PID 1688 wrote to memory of 1020 1688 chrome.exe 29 PID 1688 wrote to memory of 1020 1688 chrome.exe 29 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 3040 1688 chrome.exe 31 PID 1688 wrote to memory of 1272 1688 chrome.exe 32 PID 1688 wrote to memory of 1272 1688 chrome.exe 32 PID 1688 wrote to memory of 1272 1688 chrome.exe 32 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33 PID 1688 wrote to memory of 1332 1688 chrome.exe 33
Processes
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXEC:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\Machines _ Triage.eml"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
PID:2304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef66897782⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1204 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:22⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:82⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:82⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:12⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2348 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1428 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:22⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3204 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3456 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3580 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3612 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:82⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3744 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:12⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3676 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2940 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1880 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2324 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3580 --field-trial-handle=1404,i,1144510277261201472,15982754466206061539,131072 /prefetch:12⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5a484f2f3418f65b8214cbcd3e4a31057
SHA15c002c51b67db40f88b6895a5d5caa67608a65ce
SHA25679cbe928773386d07f0127f256f383debed5ccea5ff230465bf46ec7c87319d6
SHA5120be1bb8db08f6e6041a85cfee90cd36a5b595afbca34d52a125465454fc806b4bb7ae569eaf4c882922fb1b962b6060534e597791cd0ad23483be5981d9be85c
-
Filesize
24KB
MD5f782de7f00a1e90076b6b77a05fa908a
SHA14ed15dad2baa61e9627bf2179aa7b9188ce7d4e1
SHA256d0b96d69ee7f70f041f493592de3805bfb338e50babdee522fcf145cb98fc968
SHA51278ec6f253e876d8f0812a9570f6079903d63dd000458f4f517ec44c8dd7468e51703ea17ecce2658d9ea1fdb5246c8db5887a16be80115bbf71fe53f439d8766
-
Filesize
288B
MD56e241a46fb3b448bec08e387f59c636d
SHA179b1f13e3c8ccb36ce156a23938a5f72ca5cebba
SHA2569465551a2f6e27541fd05cc4d5a1e78666d2fcc985a96cfdb6d57409d9d7624e
SHA5129af9aa7b37923da288c66b76d9b97990d9a07befaae88d03b5f6a36395ddd0183e2208f67a2e8e2a89939ecade3957e87ad442070c3813430a6730eb69e29209
-
Filesize
288B
MD52d46a410d65578a2d5f01f1ac4a6a297
SHA1c2be08b8c540ff7bc1f9c76f11bab666f1f948aa
SHA25686c76c9a0584a5301b78a833aec31f3fb48cc273d1c838906d5d8922909feead
SHA5128900d9b4807fe8ff108b31b984410f7241e9548f7b8ec3a839ee034ab5cbbc209c3e9f4befeaef72ca0d4f8405163c9fce0bb9c7cbeb85b7b5ff5f13670eb75d
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
525B
MD5985914249183933cdf8709676df67300
SHA1c4361ad60df07cba93eaeef4d5eb4e4017759f88
SHA2567565c03c562e13170fb30499abab69d7f8f3c4cceea654180df6352152b7a20b
SHA512ae99304a60f8bb7c3b90867afaef853133d918d64f71bc1626667b852d74c94cfe4e4c4255fffd1ce7173c15cee8e9042e6ea6dec3b547e80f990215c13a1363
-
Filesize
525B
MD5a26790244026acc2bcfb0d236230644d
SHA15af092b16a7ef9b9ddb53370d2aca5b9eebd4086
SHA2561562a65d468b9ea00caefaba84f8860031918c671c3ec057ab6e00ec9609e122
SHA512f16660e05d767b6ec52b6f1c6de8ae3bcc47e46c88c149696da6c06bb00249fecb26eb95c6189676af6e254de1cc32781e5ed1c94296c0bd34d7210362be7d24
-
Filesize
6KB
MD513b98fec282362233a0e136940323f8c
SHA11afe42a6a9830b4cb3ac796b9c375d3356b4fc7c
SHA256ed9994cc9f2076cef51eccf64bf98d256b01b9cd72b8c5bb968e3fca171539d4
SHA5124fa5589ca8ee4afa8ff4169032218fec1593a951ffc961fdfaaf1a8b54ab5cab9dec74024d664e84a52bed367ec00a37b856482397fb70bdcff9539e6ce06f76
-
Filesize
6KB
MD549f32c639d1c3b41f46a93b621962ab5
SHA14645f9d462c4d70dd44f3a6a68cfed7242e0022b
SHA256f3557312ce5d2a9eaaa6350c46d69aa574f3cf5c5b4d926e95b32a4758c06aec
SHA512cd456b864049b7c54d711ba6c6ee2ec823a72ef0260714b7402bbdb8e1e2f2c25efa3aa1c5f6068d552797ee5c20109f5be5fe955b82de997787dfafb27a60bf
-
Filesize
5KB
MD534db177e2635454adfefec6eb997d58a
SHA1a7f53518cc0474c008c9fef55f4a281b9716c221
SHA256fbc01d89c11de2571a0db2f46af2713814101a9cd0485c689124f917af31ef4d
SHA512823e552c1152c15420d70c4e63fde83611277c3db26019fcd35f9fa6ada9fe0bafcdc668960401a93bf34c194ffefa605848578c690ef512c746d8ffa30477ea
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
266KB
MD52298d6fc60e29e7afd2a44d6d45242d9
SHA1e125100658bf913b211b77032ea377f2581eaa25
SHA256664edb51abf4dcc4b5a1c21446c51add504fac4bea3c819cd428740a5842649a
SHA512f84f6cc6c1242cf9f193c8544a2b7491d6346563a41e72c18f96d2c0cbe272a22b38f7e3c69bb0447e00063b7a753df3d1e803bf5c1f9f823dfe41f05329154e
-
Filesize
263KB
MD55a61e9fc98868ad41e9ca955fb234a3a
SHA142aa05b07b3bf04606f5e7faaabeb8fa2588e772
SHA25668610c92fbb3703d8c62644e50348d851631fb96e9ed37ef4e96696f33cfc932
SHA51247f87ec074329ffd2c2ccf20b62c2f5604644826c40e1990dd9603e7288dfa6c36b6799edba55262765b3f7a229b2cdb7b6280be123189b4350c7580ccab43e5
-
Filesize
235KB
MD5375e1d6e5bc488ac3fa9871c3063d743
SHA170ee6dcd1cc0fb5032b07611795c7990969cecc6
SHA256d39428f739bd19d0252198796c3b909ac60375a489a951d565a241a20f90b939
SHA5120754e7d0553de0bde4de10bc8ce778a875cf966a55643fefec032f399f405778d5bf4391b216f021a178fe75ceb7d3795d587ec8f9bdae3a6891da8b937c6320
-
Filesize
240KB
MD5c220b5b3873e295d131b26457530a78d
SHA108b7ad3611f010ec959891090614e14cc0aaceae
SHA2562d14b6f6c267d51075bef8db9b9ca514ad8becf9f36a5686172afb9e14560568
SHA51217ef07332bdcce09a3fe3db4d533db31602aec50b04ec000eb105fd15a6b42052fc0a9b7906a80ca12f31d7cdc0e1588b78b4e0092ba8f1ba06c96e3f47fecb5
-
Filesize
1KB
MD548dd6cae43ce26b992c35799fcd76898
SHA18e600544df0250da7d634599ce6ee50da11c0355
SHA2567bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a
SHA512c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31