Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 18:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://api-internal.weblinkconnect.com/api/Communication/Communication/1148248/click?url=https://indigocanggu.com/bot104&x-tenant=WinterHavenFLCOC
Resource
win10v2004-20240508-en
General
-
Target
https://api-internal.weblinkconnect.com/api/Communication/Communication/1148248/click?url=https://indigocanggu.com/bot104&x-tenant=WinterHavenFLCOC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133597542949724130" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 2088 chrome.exe 2088 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 4824 1768 chrome.exe 88 PID 1768 wrote to memory of 4824 1768 chrome.exe 88 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4692 1768 chrome.exe 92 PID 1768 wrote to memory of 4372 1768 chrome.exe 93 PID 1768 wrote to memory of 4372 1768 chrome.exe 93 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94 PID 1768 wrote to memory of 2948 1768 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://api-internal.weblinkconnect.com/api/Communication/Communication/1148248/click?url=https://indigocanggu.com/bot104&x-tenant=WinterHavenFLCOC1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83972ab58,0x7ff83972ab68,0x7ff83972ab782⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:22⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:82⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4372 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4512 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3036 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4784 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4604 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3384 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4564 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4676 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4684 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4760 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3388 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4128 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4604 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3048 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4564 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=1812 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=4680 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=4380 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=1820 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:12⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1900,i,4043076348481707387,9130037960326211811,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4328,i,5047420736443372512,9747851268033796534,262144 --variations-seed-version --mojo-platform-channel-handle=4612 /prefetch:81⤵PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b1ae397417b994e339bf6ca3c9d35964
SHA1d9401776d99661f734151abcdc8b5985b06f51f9
SHA2561225c6c66fea00de6bc41cf5e5a8fb228212ba2d20c20379d59d4aaed6b6120a
SHA5122b06f7331a4a23667e6f190433898e1d889b1df9c2a597d9482c2ed7fc7a5a5a7888ce4492329db6a4a63b0db09eab876f0c44f139530a3e916ee3bd0c9e70b5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5d3846405a4f829706b84f6fabe7fc55f
SHA1838471c93365a1b35278116a4fe4e58a50e458ce
SHA25626dc685a2ca99d327e0c01d17813dd863ea75688422c7a004e7f69fd638dbaa0
SHA5127d5dd622fdb1b2acb58d1997a22929f221ee394c020bd9fe1f4eb168a211a571dee2431d2df2b9539690cdeae8a41a9c7d7b9b52f680aa3a6c9bb8c3147023d3
-
Filesize
7KB
MD5bd5b0bd38b28579bce27ab654eff16a2
SHA144bd5b145d4e9975d3a20bed0e455cd5843107a6
SHA256bddb42cf4f3f31a62617759efba8650376af6dec5ecf59489c2a92fd0cfa6e0e
SHA51276b8053bc413bc751aea7619988ceb8c445328d7973c1c453235e7114e2730bec48a9caa38d5dbed2c4bf3bc7fef02baf4f06d76864aa6db129706d8296bc575
-
Filesize
6KB
MD5ee910036429512da267849fb1e396bc3
SHA1add0949ce16382004f91f11793d482d14e4aa1f5
SHA256e0e01af58b8d74ac5fd73e477e24d98338f13ea07ebcdfad5013b633ac9a5fda
SHA512b50ddf75f89ebde1c6d5fa62e68d362f903a8b95390723150372c17603489f1650d463d1dcbe7eb140779c9de1997ad3ece749b011174d867e136e0607a54211
-
Filesize
255KB
MD5c31843a0b3429968238026079166c880
SHA1aeaa6404b91e53f6b95105e7868b7841f08806b7
SHA256c38c1e5dfdb86a1a48a12a7f2f89b38102b0e4bf4c388681216b49e8a5ced572
SHA5126916830a25256f9cad6f53dacb12289879599857423fbf78c4284161ad6b16fc856df268efa117e91c9ea2f48cf71f9e04b7c755df86ab68c7c90bd290b27c4f