Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-05-2024 07:07
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20240426-en
General
-
Target
source_prepared.exe
-
Size
10.7MB
-
MD5
ae2dfddcc27d95292af179d705e595f7
-
SHA1
06700eb7e0579d1bc6df8bbf35025e63e3d5852b
-
SHA256
84c0528ffb6db5baadcf0761bda6d54b3f7995d9e47e9a1d1e8e7eac6a2875d0
-
SHA512
a59fd21e902daa9dc1fe3007e7a381191552c23d1bb96d64154c3dcc411b5fc47d885d434bd19afac2f73eac7655bc9aa852ee0875b6190a634d67d32a37e56a
-
SSDEEP
196608:kh3MGe6XEhUYHpZeeNwbnKFJMIDJuRtJ55mIQFAlGHST5Umu8bT:/mExwbKFqyOtT5mrVHyTl
Malware Config
Signatures
-
Loads dropped DLL 20 IoCs
pid Process 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe 1536 source_prepared.exe -
resource yara_rule behavioral1/files/0x000100000002a9e0-50.dat upx behavioral1/memory/1536-54-0x00007FFDC73C0000-0x00007FFDC782E000-memory.dmp upx behavioral1/files/0x000100000002a9b9-56.dat upx behavioral1/memory/1536-62-0x00007FFDD9370000-0x00007FFDD9394000-memory.dmp upx behavioral1/files/0x000100000002a9d3-61.dat upx behavioral1/memory/1536-64-0x00007FFDE23E0000-0x00007FFDE23EF000-memory.dmp upx behavioral1/files/0x000100000002a9b7-65.dat upx behavioral1/files/0x000100000002a9bc-67.dat upx behavioral1/memory/1536-68-0x00007FFDDE9E0000-0x00007FFDDE9F9000-memory.dmp upx behavioral1/files/0x000100000002a9d2-70.dat upx behavioral1/files/0x000100000002a9c2-85.dat upx behavioral1/files/0x000100000002a9c1-84.dat upx behavioral1/files/0x000100000002a9bb-79.dat upx behavioral1/memory/1536-90-0x00007FFDC7040000-0x00007FFDC73B5000-memory.dmp upx behavioral1/files/0x000100000002a9c0-91.dat upx behavioral1/memory/1536-89-0x00007FFDDC690000-0x00007FFDDC6A4000-memory.dmp upx behavioral1/files/0x000100000002a9e1-92.dat upx behavioral1/memory/1536-88-0x00007FFDD9000000-0x00007FFDD902D000-memory.dmp upx behavioral1/memory/1536-96-0x00007FFDD8FC0000-0x00007FFDD8FF4000-memory.dmp upx behavioral1/memory/1536-95-0x00007FFDDC720000-0x00007FFDDC72D000-memory.dmp upx behavioral1/memory/1536-94-0x00007FFDDC2B0000-0x00007FFDDC2C9000-memory.dmp upx behavioral1/files/0x000100000002a9de-93.dat upx behavioral1/files/0x000100000002a9bf-82.dat upx behavioral1/files/0x000100000002a9be-81.dat upx behavioral1/files/0x000100000002a9bd-80.dat upx behavioral1/files/0x000100000002a9ba-78.dat upx behavioral1/files/0x000100000002a9b8-77.dat upx behavioral1/files/0x000100000002a9b6-76.dat upx behavioral1/files/0x000100000002a9ec-75.dat upx behavioral1/files/0x000100000002a9d5-72.dat upx behavioral1/files/0x000100000002a9d4-71.dat upx behavioral1/memory/1536-98-0x00007FFDD9360000-0x00007FFDD936D000-memory.dmp upx behavioral1/memory/1536-100-0x00007FFDD8F60000-0x00007FFDD8F8E000-memory.dmp upx behavioral1/memory/1536-102-0x00007FFDD8610000-0x00007FFDD86C8000-memory.dmp upx behavioral1/memory/1536-104-0x00007FFDC73C0000-0x00007FFDC782E000-memory.dmp upx behavioral1/memory/1536-105-0x00007FFDD8F40000-0x00007FFDD8F55000-memory.dmp upx behavioral1/memory/1536-108-0x00007FFDD9350000-0x00007FFDD9360000-memory.dmp upx behavioral1/memory/1536-107-0x00007FFDD9370000-0x00007FFDD9394000-memory.dmp upx behavioral1/files/0x000100000002a9b0-109.dat upx behavioral1/memory/1536-111-0x00007FFDC6BE0000-0x00007FFDC6E25000-memory.dmp upx behavioral1/files/0x000100000002a9dc-112.dat upx behavioral1/memory/1536-115-0x00007FFDD85B0000-0x00007FFDD8605000-memory.dmp upx behavioral1/memory/1536-114-0x00007FFDC7040000-0x00007FFDC73B5000-memory.dmp upx behavioral1/memory/1536-116-0x00007FFDDC690000-0x00007FFDDC6A4000-memory.dmp upx behavioral1/memory/1536-117-0x00007FFDDC2B0000-0x00007FFDDC2C9000-memory.dmp upx behavioral1/memory/1536-118-0x00007FFDD8FC0000-0x00007FFDD8FF4000-memory.dmp upx behavioral1/memory/1536-130-0x00007FFDD8F60000-0x00007FFDD8F8E000-memory.dmp upx behavioral1/memory/1536-133-0x00007FFDD9350000-0x00007FFDD9360000-memory.dmp upx behavioral1/memory/1536-132-0x00007FFDD8F40000-0x00007FFDD8F55000-memory.dmp upx behavioral1/memory/1536-131-0x00007FFDD8610000-0x00007FFDD86C8000-memory.dmp upx behavioral1/memory/1536-119-0x00007FFDC73C0000-0x00007FFDC782E000-memory.dmp upx behavioral1/memory/1536-134-0x00007FFDC6BE0000-0x00007FFDC6E25000-memory.dmp upx behavioral1/memory/1536-136-0x00007FFDC73C0000-0x00007FFDC782E000-memory.dmp upx behavioral1/memory/1536-153-0x00007FFDD9370000-0x00007FFDD9394000-memory.dmp upx behavioral1/memory/1536-168-0x00007FFDD85B0000-0x00007FFDD8605000-memory.dmp upx behavioral1/memory/1536-167-0x00007FFDC6BE0000-0x00007FFDC6E25000-memory.dmp upx behavioral1/memory/1536-166-0x00007FFDD9350000-0x00007FFDD9360000-memory.dmp upx behavioral1/memory/1536-165-0x00007FFDD8F40000-0x00007FFDD8F55000-memory.dmp upx behavioral1/memory/1536-164-0x00007FFDD8610000-0x00007FFDD86C8000-memory.dmp upx behavioral1/memory/1536-163-0x00007FFDD8F60000-0x00007FFDD8F8E000-memory.dmp upx behavioral1/memory/1536-162-0x00007FFDD9360000-0x00007FFDD936D000-memory.dmp upx behavioral1/memory/1536-161-0x00007FFDC7040000-0x00007FFDC73B5000-memory.dmp upx behavioral1/memory/1536-160-0x00007FFDDC720000-0x00007FFDDC72D000-memory.dmp upx behavioral1/memory/1536-159-0x00007FFDDC2B0000-0x00007FFDDC2C9000-memory.dmp upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133603168674441463" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2868 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 1536 3876 source_prepared.exe 81 PID 3876 wrote to memory of 1536 3876 source_prepared.exe 81 PID 1536 wrote to memory of 2448 1536 source_prepared.exe 82 PID 1536 wrote to memory of 2448 1536 source_prepared.exe 82 PID 2080 wrote to memory of 4784 2080 chrome.exe 88 PID 2080 wrote to memory of 4784 2080 chrome.exe 88 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 908 2080 chrome.exe 89 PID 2080 wrote to memory of 832 2080 chrome.exe 90 PID 2080 wrote to memory of 832 2080 chrome.exe 90 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91 PID 2080 wrote to memory of 3160 2080 chrome.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:2448
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffdd87dab58,0x7ffdd87dab68,0x7ffdd87dab782⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:22⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:82⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:82⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:12⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4296 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4492 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:82⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4576 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4992 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:12⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2324
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0dc12aa5-6492-48db-8802-3ad2e3ff5e30.tmp
Filesize7KB
MD54690c97f225d540b4c91086c2877b692
SHA1770246ce1292b37fd99d32d02c034fc038cc97fb
SHA25619f714dbfab3979555e08727a76a16e48f5f5a29b7c25375e7db02063446f326
SHA5128ec5d87ca1e73fe00955fdcc2d1bd1bf99361d1d8b73c37689f58eb056427ea587e29f9e5e9c2142592d41f83b69bb00e330934405bec4604582a93db514c4df
-
Filesize
199KB
MD5585ac11a4e8628c13c32de68f89f98d6
SHA1bcea01f9deb8d6711088cb5c344ebd57997839db
SHA256d692f27c385520c3b4078c35d78cdf154c424d09421dece6de73708659c7e2a6
SHA51276d2ed3f41df567fe4d04060d9871684244764fc59b81cd574a521bb013a6d61955a6aedf390a1701e3bfc24f82d92fd062ca9e461086f762a3087c142211c19
-
Filesize
168B
MD5d5223595ad60cba6f4a4839528b84052
SHA1794345276c57b5c5e4bff411f8c35e646ecf757b
SHA256252c295b7bf41a1fccb7e3db5e6f911dfe624c9707a23eb7153c7a41d0be1dd4
SHA5122034a9f4aae6f1fd545a8fc551dbbd8b6fabcaab696efde2716ad4935f2f530aad6c58c29d9b11ea4e32ff5971696a8538ee91c0bc847100153f9432b1812c5c
-
Filesize
2KB
MD5c986ab5a838f445a78886ad8c949fada
SHA1ca1f8ada0f8440787a792b1cc6180e6ce7018757
SHA256cb89ba3fe136e2dd94217c56f386844accc3e8f872384bd0950becf19d72a1bb
SHA5127339fce359e6be6f8c4cd6f23e1be89f69dcae8a1f153a7b9bcb97cdcc22c484b3b35961dd20d0077285d156ba1167637edf00060b4fa2dba0d9ee0d424d0b02
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5f878567aa11304e9ffda097665c10606
SHA1e44f6a40d8131ae343c741ca4391aa228484e513
SHA2560f8637290131ad0dec8ae07bde701f82da307565a27cb469c16e99c1a1aaabf5
SHA512cfe5ac72865fc963641c7f558ef1fb6243cf8ae2e5dd205a2b2502f5a13fa56498491f34a4288f0cf5fba6fb6c8734b6e9a81c21856db6a093d4a53ac2b636e3
-
Filesize
356B
MD579a5a5d1c0ea59c09eb73d1751c6de8f
SHA155a94ea4c5015c5f2e7aae20792356fbca0218a5
SHA25613d8177182ab24697198e1d0912c1bf7f21fc649308940717af62405d7090a26
SHA5122e431154a6d5fedb3e542704ddeee71488b2fc8ab1ee948594b5440341542b0c7c7e1db20540a7260cc1844815210a22cb1da6e7f1cbd35142a0886e258ef938
-
Filesize
6KB
MD51418d56a59e16185aa88264c3bc22bb8
SHA12c3c11da214df909a3a883cccd1c8cea9f3dfbd5
SHA2567297831f6411a896757a7361c1fd888f9a4ec3638b86ee00fac27e8c47db9c5d
SHA5127d7a00b7dc8f6641d94b8beca5112458e151d84ad9e290d58444a85aa2210eb0971416de0e2cf06213134f767798ee69e5c99d8bc6a0ad2a90246e21a917593c
-
Filesize
16KB
MD55f05fcbee71181505bdaf0fba68e8e64
SHA19557f02ce88a857c1de6d972356de99074762696
SHA2567c8bb68eabfaed07e889bbeaab7fa590242cbb529e54e88c053613aa02251f60
SHA5127606300da8cf1c83be7df5d158a47a91036ccb119a0be986ea7d8d4475474fa8ab9a67c3bb6b44fdf4cdf06fe9135f3f39cba060ac51c0c7162a430eb96be8a2
-
Filesize
258KB
MD59d31c8d4507373c2e2f8207e28225fbf
SHA169d33470e0325696503f6a6ff3db91ebe2cbdeec
SHA256b5de84513eef3da5ce591b146d2f1bbd157c381e868a54fc8fc3dcf42429b995
SHA51210c44041c8350b277cf4d0f94cae0d4fed444926d9aeaf27128ff8a270e5b9078d8d0fd1ba7e03ad3bfd66456e52db7a0857f5d8e2dfe9c22141c17a1b2e5786
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD52cb9e3f89741961748d38d15dfecc8fb
SHA111f89dfac73dfacb194fa01bf6e7fddb38c1f6d7
SHA256e76dcf1390543fde2ae6fd8263e90df10923df9dfe78a5fb588a50654577fd13
SHA51220557311d13320d2f7c8bfb99e49c8af30dbcbace0faaa5101f9ea893a017a55100bf2b3c466c9d9cfe4fa8a8affcef9223a870abbcf571492fa90abd0e748f2
-
Filesize
735KB
MD5c7abc4d0572223940931179a10709b47
SHA147ccdcf47986e23ceccab1710b6dfdc1c5cb6791
SHA2569a6330706abda947f8f7fa904387b6e054db9bda509f63aa080d90188dffbea0
SHA512fd9064aaaa4a1a419ee723e07648622ca421dff69d64ab801d52c2235e34b4067930e8ac47b7a003aec05ea5a0b635a9a80abcbd78704c315c825e6a127267e6
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
34KB
MD5bac1b37093d9a3d8a69c4449067daf79
SHA16debc17c8446915b7413685da449f028cf284549
SHA256b4130ab50e425027634a8a4c01c320a70b8529f2988c3a7fb053e07847b68089
SHA51224e108ed396c15fe70a4c915a5adadbfaddacab93d20109574b2f3875ed76225f2444098f2f2c47613f5df16d31c5c93dcc77f5af7b6d9b7739d1e392260ec59
-
Filesize
46KB
MD59ae5b35c4be5684c4e20eca61c31b04f
SHA122ce82be0de9ce1975daf9779f4c03373579d2ee
SHA2569ecc29ef0eb63bfd91880bd13d1a8e8ae81d6dfd3cb0608410c1c24338e0760f
SHA5120784831b295680d5e53b3e94e7262fbb6554e7100ed66d33c370151a385ae7e979204cde55dc00ec75874e8a52152b8caf8eeaa446f3e6421322dac5af6f7666
-
Filesize
71KB
MD5d968ebcdbec08ebaa42356ca155ac6a1
SHA17953a0a9c7c38349d629968a1dbd7e3bf9e9933c
SHA256670379d72b8ac580f237a7236c4b51933b2576e8dd7689e09b9e58d55818a979
SHA5125dbfb6e928f8b96d03dd4dabf2c21f8e22a3e0983152c167e768e9e1b6771432d706d5250032ba3ffb067198fb2a18bf3e05b09ddbc84c2ec945f3d865a57ef7
-
Filesize
56KB
MD5fab57c847ccd83d1eda8d0f70223284c
SHA19036fb9ddf58384d41805b0f5701d0dd3fc9fe5d
SHA256f94440debb2c034d504859edb115ae1ba3ec3f65a084178c810eada77cc0b803
SHA5124dfff55c12415fcf4b75594bee323423a8bcf7cbec0384978d2cde23c803aa447e9935e3990e5f87aa70e4187890ac1b4bed68780bda479707e17a68d6dd398d
-
Filesize
103KB
MD5cf941d45cafbebd95dcb1dca58da1b0d
SHA194cbcd0f53286afedadd262634fb72a341ceeeba
SHA2564094591722d9ee58d739ebcdabf5c6c128014ff19c337b5b2924d0171929a5c0
SHA5129b29c7813c04838f343f08cf12a3a8c05830776551c49af8ed0c025bc4e3074f29dc7c1cfbd9ede879ddee6642adb9bd6fe01aef6ca4a9c6d3c8ecc245a9285c
-
Filesize
33KB
MD50dc4e915d9735acac7b8661a6d542d5a
SHA110b449ab2b24cf5e7cad394c21d91434f3cd543a
SHA2560855543e345e479921761853f7fbbe8834fef7e0f950ca4e087e8e19c3f35271
SHA51251cd2c7c66a3d9fb4cf99df01de388c11429a961542a6454509131e1dbe776ca040668e50141f3abaab8f760484240c22e047a278dd3ce932745075efab33139
-
Filesize
84KB
MD5c1b2399c226b9010dfaa6a1022c636b0
SHA1d5dfca039b69b32ad8b5d65c197e0f59fb7aa954
SHA2566a962508477ac29ae37b40e9fe6444382a528390fe4a0c8f1685cabcf91f1e94
SHA51245dc18daf7b3c8e9350aa71ae0b58e452fa275a4fb25dbc26c003e46c49b73b7606c86a7c7e0e2dd91e30bdd35c3007843f9d749a7e6138d953e60a839186d02
-
Filesize
25KB
MD59e1a8a2209262745323a3087e3ca5356
SHA1db5db846be89ed930291afd3e0b5ee31f3e8a50e
SHA256f7bc9e58a91241d120998e2125173b8ce05fb178e4c77825bcae0f9afd751769
SHA512bb5741285b773b36a2c24f15d28d172cb96220a662111a587f5ea6a9652a3e09b4795737ae8d2785243990039ebb8f7a597423e3dbd9a69a9cc4917222fa65e7
-
Filesize
30KB
MD5a752451482e3a12bb548d671dfdb8b45
SHA1cd1b4b5fb4bd967a88f22a309fc4f91df2c5a6e9
SHA2566c415e1ff4c4cc218c8b3df6678f1eab8d4206bd269f68512910fa04b64b8f22
SHA512841408f1e01ac372e80882fd2e38207a92a26d5c445172ddc776279e5b08572b72a88011402d644135db145fd0893278999a09db15cc18920103b90fdb76de56
-
Filesize
24KB
MD55bd3fbb7f1171cffe63b6b47e5e5fb15
SHA1d515256427a6226a6e4427f50609150dab6932d0
SHA2567c58a79fa60ed0c4cdc7cfca402f253a0ca9d3ae5e44a874f5c985b63d747846
SHA5124dca6f530cddb7ed1900c55e6700418ba35c7152c7cf81fae3560abdfee44bf6e27f9732a3bad41b91d87399c5759153efedff07d51f279b992c0638efc38e14
-
Filesize
41KB
MD54d8292c93191560e28fb7b07da0c7a18
SHA1581496c7cdc4d21831b319e4fbddeefd0e199325
SHA256d1f5ea3f8990b244383745d21b69d3049889edaa19cb2f4d2962569c09e74585
SHA512e9368c79b0377d94b1a5fef914c11856b5953d765e2b0eb7ae4020cd69176c705d7853d787bf3e0d076cb289d41e78e0dfb16c8abbe981e1e9535c73b690f271
-
Filesize
60KB
MD538ca1ba20bfff771bb89b1be9fb5857b
SHA18bfafe01eb4153da807af132d6b6c0c6e5af03e4
SHA256ed91c75638b9ee9a6ff771a735d6ccbb9273b9fcbbe5ee8734ee0130e3b8966e
SHA512c5e0ed2b4d24e628bdc275f9540d7316a42af0cf098b3fa1232a270c7cb68110120a884c5cea254220b9a58f9a16ee12cc394e54bc43982271c88f6cb0a7a80b
-
Filesize
21KB
MD5aa65dc954ce85134a8f5d8604fa543aa
SHA175a31d76c85b3a78c906c0564fa7763e74c2fc49
SHA256d7b691db91a6bdad2256c8ef392b12126090c8f4d1b43bfd3ec5a020b7f6a7ab
SHA512e40b03e6f0f405295b3cde5e7f5b3fdbb20de04e9715b4a31eebddf800918d86ac1b74431bb74ed94c4326d77699dd7b8bbe884d5718f0a95ca1d04f4690ea9b
-
Filesize
859KB
MD522fee1506d933abb3335ffb4a1e1d230
SHA118331cba91f33fb6b11c6fdefa031706ae6d43a0
SHA25603f6a37fc2e166e99ce0ad8916dfb8a70945e089f9fc09b88e60a1649441ab6e
SHA5123f764337a3fd4f8271cba9602aef0663d6b7c37a021389395a00d39bd305d2b927a150c2627b1c629fdbd41c044af0f7bc9897f84c348c2bccc085df911eee02
-
Filesize
1.1MB
MD58e7025186c1c6f3f61198c027ff38627
SHA179c6f11358c38bda0c12ee1e3ab90a21f4651fa1
SHA256f393f54886674e42bb7667087c92af67bd46e542c44ddff11c5061481261c90e
SHA5124bbbf7d0a51aec361779d7735c6a91f1bdd468da0aaa3626c3cb52128c998d6454be8c473c8743172ffcea9dc66403a5a81ff5535d9baf87fa6ab990a35add41
-
Filesize
23KB
MD536b9af930baedaf9100630b96f241c6c
SHA1b1d8416250717ed6b928b4632f2259492a1d64a4
SHA256d2159e1d1c9853558b192c75d64033e09e7de2da2b3f1bf26745124ed33fbf86
SHA5125984b32a63a4440a13ebd2f5ca0b22f1391e63ac15fe67a94d4a579d58b8bb0628980a2be484ac65ad3a215bbe44bd14fe33ec7b3581c6ab521f530395847dd5
-
Filesize
217KB
MD5e56f1b8c782d39fd19b5c9ade735b51b
SHA13d1dc7e70a655ba9058958a17efabe76953a00b4
SHA256fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732
SHA512b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46
-
Filesize
203KB
MD50bfdc638fbe4135514de3aebf59fa410
SHA1963addfdadf918339dfcab33e07bb6c48c86099e
SHA25677affb7e88ab70fa04e382e29bf04a94ddf36c5cbd88b29ff33e15912d83ed01
SHA512768abcc391eea4a3b34b0aade99932cd9befb922dcf9e720edf4c4719938214236e8668eca67026bd07567fbd10bbba98d63f47d63a81c7be1adce3bdd1973e4
-
Filesize
127KB
MD552587c9e32674d86e37f8c4e5e7d7155
SHA1fce92156f1c53f6cf1ec237e5312aaffd9a10098
SHA25618d562189f497f99d833b3b69e1c05fcd1f4a44c2795870a97cbf894b70d42ad
SHA512c9fafbd5346d5fc33150ce272af071e407e0ce7cf02b6aa45f320d66992373d4f25309f218da2a4d5e0a76e1d7ceba22357bfa6b7ccf07b58b753c30662c9d62
-
Filesize
86KB
MD59cbd08544dce0712557d8ab3fa0d2d15
SHA1cff5ea26bd61330146451390d6cecbda1c102c57
SHA25677813956d86430e1d850989eca1ace8641b7523ecbe1de825bd2fd7094f15f2c
SHA512e9879b10f26b4205d389de77a978135d285339d971ddae6050cd8453aecf7ed8e39834a685c77aa1beddb8d7d922f4390278c772beb9cd0bfbd7cc8a77c7fc90
-
Filesize
63KB
MD5c17b7a4b853827f538576f4c3521c653
SHA16115047d02fbbad4ff32afb4ebd439f5d529485a
SHA256d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68
SHA5128e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7
-
Filesize
1.4MB
MD5933b49da4d229294aad0c6a805ad2d71
SHA19828e3ce504151c2f933173ef810202d405510a4
SHA256ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206
SHA5126023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165
-
Filesize
24KB
MD58b91bc5b3b28d3249b1886c3486727b7
SHA117e07af111d3c7dc0a1525dba5ca8360692360f8
SHA256e88ae878cf7760a627c5af55fafa7e368c8d0bbc8b8a8d4af994d45dbf793cc2
SHA512dd30cb9ee09a6195500a0d3cca7677e2d63d55637324f2f41aed7feaca148af81d318808d82782bf3f37f0a6c85ef14384ea01f1da5a527e4d68b24f1143f238
-
Filesize
287KB
MD57b9d6bb4bae7177720e25f3ce6cf6799
SHA1b316d70aa7d09c047a516f0bc5fb6b3469eeb072
SHA256286fa59eeec3b6eb2382cb7a1c92da3b70ba5308bd5435e793cf9579da0a97a3
SHA512efda641a23363d2e5e6a1f19fa064fdba5a2ba9ae8deab3e8b8b45bed144d5209776a063f165f22365904797a4642f39aa9cec3dd153106a641bf13e067f7ad1