Resubmissions
08-05-2024 06:08
240508-gwdyxsha96 707-05-2024 11:40
240507-ns3w7sgh76 607-05-2024 11:32
240507-nnph1sgg28 107-05-2024 10:46
240507-mt65ksfd26 507-05-2024 10:45
240507-mtvfsafc92 107-05-2024 10:34
240507-ml65lscc7s 6Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-es -
resource tags
arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
07-05-2024 09:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pene
Resource
win10v2004-20240226-es
General
-
Target
http://pene
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 359 bitbucket.org 360 bitbucket.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133595471335621003" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1904 chrome.exe 1904 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 5084 1904 chrome.exe 90 PID 1904 wrote to memory of 5084 1904 chrome.exe 90 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2400 1904 chrome.exe 92 PID 1904 wrote to memory of 2096 1904 chrome.exe 93 PID 1904 wrote to memory of 2096 1904 chrome.exe 93 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94 PID 1904 wrote to memory of 1860 1904 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://pene1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa74cc9758,0x7ffa74cc9768,0x7ffa74cc97782⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:22⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:82⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4088 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3804 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4188 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4040 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3348 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5200 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5380 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4616 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4728 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5260 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5268 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5500 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5352 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5348 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=6244 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=6396 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6588 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6892 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6844 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=6376 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=5316 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=5304 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:6004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=5324 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:6012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=7420 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=7664 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=7784 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=8000 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=8176 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:12⤵PID:5536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5428 --field-trial-handle=1844,i,6547493605673833353,1913718320475678792,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:3776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5280 --field-trial-handle=2000,i,11471789752336399729,10863385903208193579,262144 --variations-seed-version /prefetch:81⤵PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD59dbe3dfac64bb71031f0575394007b40
SHA123c8ddaca2432c748408eae4b5a3c8a9d50cf6f3
SHA2568322895c20694be4cf13b5f39784f0a4a4cd03fe1931baa8aefdeccc557362c5
SHA51286bad3f21b85e6796598eb0da5357a2d5181b742db6447b2cc446bd05c135d20607351014040cb3c9eaa509e76f8d9c5361b03232a96db48573e92103ab8cde5
-
Filesize
200KB
MD5a484f2f3418f65b8214cbcd3e4a31057
SHA15c002c51b67db40f88b6895a5d5caa67608a65ce
SHA25679cbe928773386d07f0127f256f383debed5ccea5ff230465bf46ec7c87319d6
SHA5120be1bb8db08f6e6041a85cfee90cd36a5b595afbca34d52a125465454fc806b4bb7ae569eaf4c882922fb1b962b6060534e597791cd0ad23483be5981d9be85c
-
Filesize
1KB
MD5e43843b7230683e16f13a9d2551460a0
SHA1f4b1ee0a58bbde5d7043289841741f8a47f9ba97
SHA256e95e13a8a529fff63c195e032f18e2a0fafac847d2abd72b631b75188df1ed57
SHA5125520c71ceb15187586029b190929d4fe9d209b7beef289db56831a28e219473ec419be723991f6ab8f641ddcc9f6bef09b442d50952369be5ba5de734fbe5c5b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5da4f138f2d53e0c23576a9e4e94001e3
SHA16c820ca2b0a1169f4a24915d05d0aa9cdcf8a406
SHA256aec24bf28364aabaadc15bf41610493e52f6a11d5fd4ac9e88cb06e4022ee96a
SHA512bf48de3d12a33287ae792c61171c231c2f0ee4a7b5a6add652e64da3fe5777c5be914c585cf60b8fa88e36253831793aad810fbfdf44bf3de1293a2cfa774b07
-
Filesize
1KB
MD55c61bc9e15e654df06c42c61ccf84aa9
SHA1596457997358516e2c56a210eef89c8239ae703d
SHA2562c1066578b514b6ba59da8a5e153f01d27ca98bc3747c57603c948024c0f6040
SHA5120cf215ae1af7a83c10f3d3a7337dd7463857dd65d29a3b98c9ae8cbb51c0882a0ea9f227aef0dab0603215aeeaabe737fa7ed9d023117a5ede210c6eaa1df2b6
-
Filesize
536B
MD5b61cce9c2228b8c990d93ca2b368ae95
SHA1e9d74f88bd8e29eecaecf99185ffd2eb9468a17d
SHA25625b4bf8a63e86b714ba106159bdfd48a9ebc127e466d67f914968807f68750be
SHA512a11ab5534c53a892791c4615a2f732b66152458e698596006669d73ea881d5dae11ad0051aab6d593d194cbe03d0ca43ef208b53b8157b67b05b29f54fe619d5
-
Filesize
369B
MD53b803b507669aeea9162b327f7678544
SHA13a70a370da82b495657a4532064c66e7355fe5dc
SHA256f935e2179072a5ab96867b35e43ad6089a3956711058119502c6acf115bbe081
SHA512193de2b781feb0691a9e7b2978a58332f7b389f4fe0629ccc7067f1730c82eda31af4af09dd4ae46c2c4a1455a524485005b955943c7e9ea5f0eca07c5c4522f
-
Filesize
369B
MD5d2322eb49954113dd6f24938e0ed5a29
SHA114fbb73b40cf7df67f25730dcefe3d5f2d496c34
SHA2561e2901419ec583896105fb11e347012c79e2b4a97ca55274da5317c84df40bd7
SHA5127353d9b2e75e230a45dca07c14c73b99e0a73c8eda2cdac5b5b01935ebf36f2103a35bbd10b6610ce8101ae0df64deee8139208c4adc8655a7546e2eb6588ddf
-
Filesize
369B
MD51698e688f7a9989a127a26a8b14dfae9
SHA1b652207e8bdc3d778cf285c58380324dd1f21604
SHA256262d77c6a7aba42d09f17a0f89442808cfba7d3b84ce800719dd16faacd83c90
SHA512b9fe6789a6dd2532a8e45a12dc17d92438f90753079402d4b2aa1bbb14885e2d92d636cc3d2a401a1e989b0047d8df29a51140e63d94bb2eaad4e8029a60d57e
-
Filesize
6KB
MD5326841d0abdf6040618ab8111e9d5d7c
SHA116e6762ac7ef66e8e3984854712c1c480d358550
SHA2562b1aead13b1c83701657bdda7e052d42f996f9db506b8b083c15062c0ac16fcf
SHA51264d2359c987ccf09527d8d9b6c1df66f0787889c6fa27e627c8e4c472d9693557222280896f4f086fad534e4d1495b9e83995ce216ff1d40ccfd391e6733b290
-
Filesize
1KB
MD5086909253adb130fcde5c1aa7f8f1b41
SHA1228b3733643774ad39056d288e0ec088f035082f
SHA256778ca63bb4e9267a89d15c1c1c08ccb470a1397cd1fd69a451f3ad66f5ff956b
SHA51239dd1d2c40b8c88b71d2cd4c2052db0c9eae57ee572b88dcfe870e016faf9ededf5e6676aafd32a22af6a85f2049c29f965256108f9a389a02f4cefb8cf0e5c9
-
Filesize
6KB
MD568e9f08c400deb3260492e1c492250cf
SHA14eba97eed02df12ba3d0035055b078049b169459
SHA256b3652726dc53bf36266c267244082c1b7ddd8d98eeb15ef2260e9adc6e6fcac5
SHA512725cb3ecd6db16fcfcc41c3df879a95c13be8cece0796cb6cc21b58cc254693aeba977f3d18aad121448ca7e955b5e747c4bab1f9ee412be6a8ccde6a6781e07
-
Filesize
5KB
MD574c39eeb08719e06a0e0ab91da99a335
SHA1553db0334cba3afc59198b35bc2c6e0b8b2bb7e3
SHA256b4f1b38550258e05f11381dc16290bdeab77c9a01cf6aa0d1ac3a2e6489c4f22
SHA512e1a7e67eccb7d187b7369e6e31a3a5826ed29c7931089ac51ab8e938fc62f6238387412088a54717214cb4ac64a5fd5e457d48b69cc2e22f604263cbfc236c8b
-
Filesize
6KB
MD5065d7a695d4a11739f28060a3931b275
SHA16fadeac0fc18172101e3cbbfea9745a0d65870e4
SHA2566919aab27c1f238f3a182ede6c1efce53bba701157d87fe677a84efa57607c88
SHA512f86a4c5f9de89b41217d047d88db2b9b69d5f7032c6b3cd6666151e30c543e8c684b20bf19ca12f441cecb36cde069d9cfd0f50aef4d24bd2f2aa8bcb88d8d8d
-
Filesize
6KB
MD57b57a1e87dd840d95ec9943da1ad8757
SHA10441a33721c3f6d6d7a10eced261f483fb09050c
SHA256560062cac954845f685ef66556f09ecd35b6be5ab535de620ec2b7a2738ddd0e
SHA512f6d5e9e88051f54f46d11627aba0c2ec2f3e52daa1e63da89eb67ef317c30370339014e2ae3b10fb5af4462cecbac62056300808fa5fb84978cafd3351b4a985
-
Filesize
5KB
MD5e51f8fc5faa57e954a56ea8ae56be79f
SHA17f9ef6db37bdf4d5e832d3d80c564f1ea87c9dd4
SHA25676939bd7e2045617ca66e14db6619d8c30b29b20005c62f6d23702e72c438a0f
SHA51218497bde41d7e4a316ebddd9d045abe0e5ed25ea307fb3bf6257343324bd7754097d10ffa156dd139d469ecbdf67631ec1e7cb2ba6ed16c84f189183531cffb9
-
Filesize
5KB
MD53c556ecd26bca5dad487eed6fbee01fd
SHA100e7c1fb7ac8e91be96517ef9259d02c88e580c8
SHA256d32f0f06db84572babea1862fb9ee48b4025cb409c8187ef6cd663c82f883afd
SHA51226766cfb2581ec5acfc208c68691f1169f1d70bed44450c11c534729c461a56fc09a4e8b2d0204a2cf044663d2ccdc8f8cf3f1a13bfd68c59d38a5e8352a1ddd
-
Filesize
253KB
MD5bcf93f355fe36a239c87323afca763ad
SHA1aa548376c73e1091ef6be5c2c9f84e7e89405f99
SHA25660469efe10b53af809b60447240403c4da625b6ce98bd8e427548eab1c9eb8a7
SHA512c5768e08b7ef39c2d25bd4747de39ff74262e5824b6f099867fc184c565cf5db334c1a7434fa3d12167f7aa3507cb16e58e87736b75a99ce5d5e21b7a7b0629b
-
Filesize
253KB
MD5bd3aa445387c799506fbc5122e60a9de
SHA14c4a611a2fbe36824f7532d878ebf8f43e203fb0
SHA256f5a5f3e34b9fafa39f7d5498d48b30570f6df34762ce4cbc8451ee8ebd6b30f0
SHA51230541f17ac4fb23e0b5bd4698cdf71bdb4b8975befb9694e1cacc7f1646e9d9a0097e182ba8a43a38a86076df81d5a34461b00fd5266250fad320802a0e4ea44
-
Filesize
253KB
MD5210296dfddb168531998fd1442c82fb9
SHA17ebbf7db661e125e02fca649e35b63856ee36fe4
SHA2560da7a9123f0e18b8f09df5662483b9962d27683faa4a387f6116a5de4fddcec0
SHA51264dd00217c3dfadf4d43473beaefd71da21768e5601c695692cbed13ab4a796ded26c70d24a02392ae3d6a68696e6f7cf6217b0bdac6b1c3aacb1f44eb58a7a3
-
Filesize
102KB
MD57840e392a94fc5ee3c3579e2d7931353
SHA1ee04b94b413b88dabbb7e645898c8149bc9f7484
SHA25615227243709a41d66c59e8b428c8c47ecb2eeeb1f65084524aad0e1106ced4a4
SHA5123b833f7614c985e868707278b562574583152eef839e9cad43423783d964eb33fca4819bac7034525b6dbce841c536f966ce838998b80d8b72ac3b627822d349
-
Filesize
98KB
MD598f78c1cd4fefbf30b51c205d5675a56
SHA170bc20d87f862093f378ff42ed1e5d94e5696b4d
SHA2569fda457aad060d6642c75bade2ee08c07c0df901b655dba4e114040b89d68c5e
SHA512c4fe7edd701ec6acd28bb59bdf6817f593844639b0cbffb34b220f4f2db91b0b5ea104587805d700ed753be37632da5ae74d8d1d625ab819743b70c3252c5642
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd