Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 13:27
Behavioral task
behavioral1
Sample
2192-2-0x0000000000220000-0x0000000000233000-memory.dmp
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2192-2-0x0000000000220000-0x0000000000233000-memory.dmp
Resource
win10v2004-20240426-en
General
-
Target
2192-2-0x0000000000220000-0x0000000000233000-memory.dmp
-
Size
76KB
-
MD5
189d1fb3d27b1a7620ec2a7d79325448
-
SHA1
b9594b0d6ea36b6b59cc7e5f31b10f86913b2837
-
SHA256
3e445afa2f9995cdfd72bd66f826cda8f4b1fbe6cf6bea4be33529c801dd9f83
-
SHA512
60b1bc3e6b3edd194dedfd89a4b464647beb122d4bb0ab3a2b7a2571723dbcfb6ec1acdb002735fed6bbf0bee5078e8f142ab7ad9e8474afa295213088c501d9
-
SSDEEP
1536:Llr2kes21VCy1nTxSYg3CXTjFWL9ydpIHUc:t2DVCyFxSYACXF3pI0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133593028828985696" chrome.exe -
Modifies registry class 3 IoCs
Processes:
cmd.exeOpenWith.exechrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3571316656-3665257725-2415531812-1000\{719BA8E2-16D4-4AC8-B499-9F9F0D7CD7CA} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4284 chrome.exe 4284 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 3680 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
Processes:
chrome.exepid process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3680 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4284 wrote to memory of 372 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 372 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1668 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3476 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3476 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3820 4284 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2192-2-0x0000000000220000-0x0000000000233000-memory.dmp1⤵
- Modifies registry class
PID:4548
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3680
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc2164ab58,0x7ffc2164ab68,0x7ffc2164ab782⤵PID:372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:22⤵PID:1668
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1948 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:3476
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2292 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:3820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:1004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:2840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4376 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:1368
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4540 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:3592
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4660 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:404
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:4516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4492 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:4328
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:3672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5092 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:4532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4500 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:1760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1648 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:2652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:3376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3344 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:5116
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3304 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3388 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:2444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5032 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:2280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=1212 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:884
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4816 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:3676
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5204 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3084 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:4276
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5724 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:5056
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵
- Modifies registry class
PID:336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=2612 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:2328
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=5916 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:2900
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=5892 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=5320 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:12⤵PID:4048
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2620 --field-trial-handle=2004,i,17870563425381900739,11770073804339851449,131072 /prefetch:82⤵PID:4800
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD50b2e2830b49157b749d4fa079d002751
SHA1451b221024d9f7113768c362b4d4ba359afdc6a1
SHA2565abdd199b880ecff2fa55b6be4dd1bbf3764c514afe2d82459789aa3ae0283be
SHA512b5aeb124e57588cec624af434430d48e3d0bc3cd071196d56d0e65a9ebf2ce41fb254fb88d3ef9449f3d03e5809d56de280db69e1429cb1b9f488777e57d05cf
-
Filesize
1KB
MD54b98496370a555221e8f07b01681ba22
SHA1fdcfb3fe949a883e3ad4470e0d91c5ca5567b381
SHA25686fb27ada94239efc7686d1674744cd33b323a4858d79ead08916117da265e5d
SHA512f5b77df748da287c88037dbfc6d3d1ff57cf9ef2db86f8e1e0f318aa671326335308ea0351ce926eb071ca14f818c5c33ab513337cbeed770db93f053b16206b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mvbdn.withblaockbr.org_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mvbdn.withblaockbr.org_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
9KB
MD5257fe70002084a8eb274582afe0519fe
SHA1bf059551d91d82e00df3ae018e09d9a47695b903
SHA256c7ced0f6c6ce77f31e9b86103cc38e66135343dfbb018312d964a138dd6786bd
SHA512168b5a275b3e7ebc35e842c2294f05994c2dde76d1c36ed6fb9cb462232ea3733feaefa50afcaad1fd4215402b3ad13ad0d7d185d4801b651b5bf8ecb9ab22e1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD51e547e323b82b951ba701f1440e95d5d
SHA153cda53c73bafd3b03392cf48ab3fea41c65a2c0
SHA2566187bbdd8ba66227edd2ea007d03b98e99164b11a42d45967b8fb6954481fdd4
SHA5127b6bbae31ff312cd9ab1809111517e1c7b5023d257c5a8667679ec326ee94d975dc0cace4dc8acb29980c116cc2dedfd7d19793223e1bf141bcfded0d4d4a83b
-
Filesize
522B
MD5327be95a70bec670871755ac54af4b59
SHA100ba45207e75555d790b696896f0dcce0d9de37c
SHA256d6de20f563df37ed12d073b1a9f6e7b6f74b5d0c907638ffdd6b5898207a3cae
SHA512493cb98203883d58589ada5b0bb6adc77d38b94726bf3afb073b16895a2d8c511a6920900c9ae443f348c92af0204198db8f54a552ea97b8b049dba8dbc4f9e5
-
Filesize
522B
MD5f0723dc44d9b99befc645ab55cf5b8c1
SHA15a2e80c4d1fb43fc50eb67689979b076fb8fa57d
SHA256caf5c850df4b7c5acebfc0616a85158e8eee42df65e6355c6b5092ed2e8d590d
SHA512d313b319aef586d168534c725ef249c44efffca2af49fcb75ea3a63b5ba3781a75dd9f7f7cd231f89afb65703933e41173a6a190a721c0ff81cea022eeef78e7
-
Filesize
1KB
MD5551c887032ddd1fe8c6e109cdde44b4d
SHA19b812719b869f780782878420bc550c8c5282763
SHA2568be2c8eb455755b4eb2ab00ee718c3a06d2fa84dfa4d0a138cf29c3d3baf0d17
SHA512e4cacf6aae117f143e92b7564ec4d6fbe286300f08a0293aad99d0bb2e6a0c8130c065bfdfdd6cc87484e7e8a7512147da91f2faee3825806c03d96c747008a9
-
Filesize
1KB
MD5144160132300417716f97057c40ca528
SHA1e2d2c2a3e50098892add990dd4be2ead6ba11154
SHA2565a8ec6d94292bbf2f3d7d629538add58fa5ffc8ab1a00f033e245c6bdc2501f0
SHA512df501ac1f9604be678d1cde1d32b7b5813c2bbe4eb21e9380d698ada46a7d1fc72501615317df7cbb18ae2812845e3d790a494738682e2d4863cae5025b9a582
-
Filesize
4KB
MD5094e0feb01fb71db05c884c8654411b6
SHA173d2cc88c65f2f85b30e69f28a61d8c5f95320d3
SHA256e47d4bc47ab2e4a65df982b0991d46b8b54e46e0d63c9a408c92c2170fa27c80
SHA51268bc940f6835299f35bf821c223c8714e34d9403801fb26c37e4b34ca73b6cf7c142256e94c75f3a424e592c167faa5d92938fafb285a5c0a4e8353b49fc4333
-
Filesize
3KB
MD56df4c04ac84eaf407de201aa9da1a1ad
SHA1d4012f1b7ea229b34ddfe032e599946b0ee9c40f
SHA256492de6b95f49fea4772c681e5b09017ec3e8a45eaef7fca8340c2f6396e85b72
SHA512c2ea6fa4454b0e04b477a3894295ecaedd1151943b21307cca8a9ad064b5877004b447773a12af96502ee3c5e334fba0c6e733ade76afa6b1ceae3db809bd324
-
Filesize
7KB
MD58d166e526026a050d91814656304b767
SHA14b8751db81783c39ce441ea2ee1765b60682bba8
SHA2565d0d0dbd5c2cac5a8127ba1b93c9327bc43db407a14f39d0f7ec3ba2850a2e92
SHA512e1fa91ac0675f6d2052f3617e14dd51c4bfa3c60ed5ed230d0a174c050a0049e42e277a8e6bf0f2fb5bbf808cf90ca0cca02d7dddf3294354e0af532bf2234b7
-
Filesize
8KB
MD5232e44e6b62cef3475142284e60b225e
SHA13c69f525331270398cd0070c0a93aee4a35a32c1
SHA256462e1ac0dc22b6a9498ff23b7c2d8d123c4f392db49a606a790456a086cd756d
SHA512e54a96ac2244c0e8b2cc477356968caa5bf4fa7fc89f330c7e7f05138873d63d81e8376f5c4fd0d6ce13877b07fa94792ea9eab954001c7634cdd04573786b35
-
Filesize
8KB
MD5eb2e9086ffd99808ba1eda72e07ee33a
SHA15f6636a217917d50bd87a6dd6210b0dd570874c2
SHA2565a6c28a0f68e399772e991e572f41165714d4791e9689d9adebaa5eb5b876736
SHA512b35470fce4962fd50318ee3fa6cf3a030b8ca6217b0c154d0d1af1442d285892fd8d9364e161da210fed68565c37983977d2fe09661a67a0a5876a439873cda5
-
Filesize
9KB
MD578eb2209e61c64527b7ede820bed66f8
SHA198c413788f4e7815882e2e6bcd3ba06362b29d43
SHA256a3ecaaf02585aacf8a1f71eb349c141e7186d2a3c966c62efe81768629abe407
SHA512c9f8793309c4e8b075aaae785c3ffbd52aefc474a526be5989aa404beaa9380cd973f70e3d96a226dbd7d6942ccd8cb9d16381ce9314ab51b70a7ccdec25d4da
-
Filesize
7KB
MD58b5318ba5a887b00e454d7e2550157d8
SHA13e7083eea1812919ea43e51556f59b49fd3daa35
SHA25698544dfe8e4a1b29d9a17bced7aebcf3ee888ce08362eb47cbf4898d712362ff
SHA51227be101aa452053ea39b6bef5d814dc829979caece39f622426b4002476e248c530023ac379cd96eba41397301e8edc6183e102162ddd85881a260f5df3f06d4
-
Filesize
7KB
MD5ff67226c47a66ac31ede557ea4041ce4
SHA1409b2626f467cba8d47e3f7ebaf488acc493fc13
SHA256402081cf3cad85302a9c6926a8080c059ce422a49312c30b1f0b89192ca0c44e
SHA5124a966733dab8c5243fa15d2f81817647122da1bd354b039e978d36830434cf8dc0b0a76b9432f2721007dda88dada64dc57c40238e0fe2494502ed5a3edd9387
-
Filesize
9KB
MD53981f889ab17f990aa9cc1be20b59d30
SHA11c59c92bc5736049fa0fb983a2be6424dd0ab244
SHA256cc1c2ee3d55cd83c359eb281dfdc49ba71d7a773cff2c1747efb9254bce01de0
SHA5126982ab906a232a3ba922062bdadb76be08581f184b7a7f87cdb562891f48874093e3ada1aff48cbd9a9fb78915bfa16d1467f4cd181eae2c70de059acb17e4ff
-
Filesize
16KB
MD58d8bdddcce90e275cf9e703289beda34
SHA10d5b0046d5263995ceaab7d2dbcb1ebc3dad4e55
SHA25625e0a7d449a910ee3e1b61921b114518f7795bf0f5237cd3e770674cb477940c
SHA512b5670d6854da3cbf2f099ed730fae89a1e51e9b9dce4ccb1759f3e301120119efbfb9e32ed8e9176457f9a86623ca19453dd363325a21f6d18dbd6cc8d305fd8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD594275bde03760c160b707ba8806ef545
SHA1aad8d87b0796de7baca00ab000b2b12a26427859
SHA256c58cb79fa4a9ade48ed821dd9f98957b0adfda7c2d267e3d07951c2d371aa968
SHA5122aabd49bc9f0ed3a5c690773f48a92dbbbd60264090a0db2fe0f166f8c20c767a74d1e1d7cc6a46c34cfbd1587ddb565e791d494cd0d2ca375ab8cc11cd8f930
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe58294d.TMP
Filesize120B
MD52c8e07375f2f72eb2a585a1db354645f
SHA13570a89925d53e97ba6909c66416644d87abd5f6
SHA256ab1d1cdcfc1db8d7727f8fdf621906c42b663d69f656f07754a37f9f3b5d0864
SHA512a1e9becc6cdd3ca3f21e90b8b0ad67f840338c77cacbc28aeff18e68cd7a1863dc353caf97b14c6a7898e9b22b6b5748d2046ddf8a29b8c5f9c0c1868205cb0d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize288B
MD5664adc4e3511197878523531739bd3cf
SHA1bfa883d00798cd1033fe301dbd2f1ea0207a76a7
SHA256945de39b0de7821c8acff40ef35e0bdf555bc23fe238e9f649283108c3ff4b9d
SHA512e28bc2f79bbfe55557fa4e767723edb3e309250d7fc0ce8f45ba1aceaf6b7afd2b7de791786cb3ad15a03ae01713443cd753f67c8ffc971098a3cd2b644cec5b
-
Filesize
255KB
MD511aa087e5b1d0e447ad0ab0046000897
SHA1df6064b387ec4433453a4ea147bde97f3b88d46e
SHA256ef8cb5ce441072355d23a29f53bcf415a7c5e49d0dd3d510728e038663eab45e
SHA5120d73ea5603d7349eeb2f74d9beb892fe691857b5fb0efc2524e1680cdd9d6c676d703de540eb00721b4563e2c87c003253c6e24374d0d1403f785cbf4600debe
-
Filesize
255KB
MD5cce8c450a1819da64ee2198c6b31d0e6
SHA140ec09b6ad1a9820f9c2ba0c26825204c75399b7
SHA2564cd3e207fdbe5260f8b48b3dc37c5421f28c1613cb8ab52c42b6fdd527ca0c96
SHA512ed88183a302516d8142e8e2585b7705d8c40d500812a1e19c522fb2862ea914058ffc44d4c5505c57b2bc59c2a39e970877948766907439470ea7727620f5d6c
-
Filesize
255KB
MD5bd07c1e1ebb1daf0e1c582a5b243706b
SHA1a376c8cfceeced786e5bac705db8dde7dfd31ae5
SHA2565fac7eb9bdfec9b7e282b3c6f2afc1755c79d8db8af9c0ad0f8b9243fd5ee0ae
SHA5128b889d9072be1ad52eb454280576fc22d3c9d8219a321b0af8559b10945e54f1e1a90db45f96259df1fb499f4a33fd9db2582c26b6949368e98de8aa2b171672
-
Filesize
93KB
MD5860f462e704ecd1a929bb6a4a3234e62
SHA1aad1a3b909c734ddd3c031fe99e93da2babf09a1
SHA256df0129e3a16f92713eeb6a99cf0a56a7bd08f59417435cda41afbe68f6f5cec4
SHA5124482b951a24b38c742c10b73ea5d5eca62d02e71228fecac80242ce8e1e2293e2ff76a9c183a92c695f85316d62f2b802f78732810492b0f374b0d637205651b
-
Filesize
91KB
MD542a1307babe166b44e0badb7fc4ad781
SHA17428a842d355b89f84968ee79ee184441f212538
SHA256964c7b4c05d2d1febd1c5094b82ec03e777ed64e89e84a258cbb596417357c3f
SHA512ef7f166b6e40c19736059a1c2de6a4e8a70397672ced31f34dee114a98c5c7dec41eeda5c9f1b70c4bcf2bf5e8bfc68e3c8c51aaef5fc1679709e8e9e439bc96
-
Filesize
89KB
MD550689eb41f4740e7072e88ad15e3c3b8
SHA16c02eaefe3eb7c3c6d27f3eab80bc58bcec7c49a
SHA256c262edc60fce7deaf56afaff2a21463030bfda3ffac4c23f3313f61a2e199231
SHA512e22fafc1c20c83c07e1907544670cf30c78142fd89761917d1b080c63ebf273198b8e411273a8162190df14b9091784da8e51ff580f452f25b7b9acc5002e6fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e