Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-06-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe
Resource
win11-20240508-en
General
-
Target
f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe
-
Size
1.1MB
-
MD5
ae0b88032d4e1a0f34fa7542797e32f3
-
SHA1
e9afd146143fe1597c046f430bdb6ebf332ba232
-
SHA256
f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42
-
SHA512
75ed97e08e8f78dce7885cc946420211abb0074cc2592e2ca677b5fc8883bdc45d49ffd245f036a64d60a655eed4f6d53edee49f090d0692923670b36f8bfcda
-
SSDEEP
24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8auw2+b+HdiJUX:2TvC/MTQYxsWR7auw2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133618135855348145" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3433428765-2473475212-4279855560-1000\{3A29EB16-10EF-4272-B647-F0699D2BA200} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1572 chrome.exe 1572 chrome.exe 3352 chrome.exe 3352 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe Token: SeShutdownPrivilege 1572 chrome.exe Token: SeCreatePagefilePrivilege 1572 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 1572 chrome.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 1572 chrome.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 1572 chrome.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1572 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 80 PID 5084 wrote to memory of 1572 5084 f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe 80 PID 1572 wrote to memory of 4788 1572 chrome.exe 83 PID 1572 wrote to memory of 4788 1572 chrome.exe 83 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2260 1572 chrome.exe 85 PID 1572 wrote to memory of 2624 1572 chrome.exe 86 PID 1572 wrote to memory of 2624 1572 chrome.exe 86 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87 PID 1572 wrote to memory of 4772 1572 chrome.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe"C:\Users\Admin\AppData\Local\Temp\f65119c9ad32be13486423eafb6f56dfaaee3078a6473c323da73a5820357c42.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcb53fab58,0x7ffcb53fab68,0x7ffcb53fab783⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:23⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:83⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2160 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:83⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:13⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:13⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4144 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:13⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4280 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:13⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4476 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:83⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:83⤵
- Modifies registry class
PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4796 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:83⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:83⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:83⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2624 --field-trial-handle=1820,i,11424934385032451129,959758603402469427,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5ede691302faa73f3a220ae57196832b3
SHA1342881f5d49390a6e99dd099a74ad60f9c07eeb6
SHA256fad413a77a4e7f07a7d987cf683abf9f0ba14e3f2bacedca0e7f0de7f577954d
SHA51297c852caaf3363d6dd23f4c98275c16b5ea47cc2eccf0f0c2df4497273931b21d405d1140657ab8af275ecf348018fe77254681ec5fa8e969161be0a457fd0d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\19195a1f-acd4-4978-a2df-79fcb7fcd3c1.tmp
Filesize2KB
MD577cf17f74a5dadc24479a6f3caf313a4
SHA1ca4172e95cc06a9604d80011a79f4277ffa448e6
SHA25647dadcef9eb7e36581d1a079bf239e8f39a82d15e326c11338dff1b6742971fa
SHA512cef4e742f175b0fd913f18e5b1f15d58d9424eaea5d44280cbb76649cc4137e8967c7434e89d6dc1ca9ee857cefcb78dc15b843b9abc03a9ee978e70b172bf0f
-
Filesize
3KB
MD56b94a9c91dea534b0d866b72930a1d2c
SHA121c005d54f243695b3966058a3e9110c3a5d62ec
SHA2561841b89b9dc24b46f9d88134218d896fd985fbd1be3da47f2d75d06e46e10225
SHA5129c2a91b13b6272d750781692e78f5e8b794f534fa030e157d00e9342533cb9f7da6c2b30c836be171ef1af65e74cd4ca3ef0dd4d1ffdaec6036988ef48ab86fb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5f6118e24841b2c9bb1758eade3558f8e
SHA18bb22c012c560888404cf7e5a5752114aeb980ff
SHA256e54a5d3cc3579126dd6bd6fe200688b177f26cc97cb7c5c5f762663491835244
SHA5123e35b6ac9f8bcba036af2db9ba9016fe8d0458c79790ef433bdec8f3816b1df15b197ceac670aec3efb2b5b68e6bea9f037886356f6ba3d5482227660f49efc4
-
Filesize
520B
MD5c1d067c0c0ee6d3d6422f00c2d76bb9e
SHA1a23c46459b4c1efe51e0bf35343b81bf3c5905f3
SHA256eb565d04946f4b800eb5f8b4e9febd0b78825f22255fa607e1b561b0dd966730
SHA512f69571e2f7ce7c0d40a524088e9f58757dbae7cfbe5c386f8d97e8eb768870066d8b9e8ddd1137cd522af007dcb6a5447935fa5160cb4300242111a679159622
-
Filesize
7KB
MD5d52dce3002d756f368955951b7375580
SHA11fb791666c06f3012148cc6b99d02e9252bf08eb
SHA25674adb34042509f40e2f8f8c210b6109b0105ca0bc4b7b48b351baf3c87c5fa21
SHA5122d57c2e91f307f1e69dd0d37f86890adff5cd5f826c6e4f7712d680a2fe38208278eabf4c37d424499efdca008855b7e9a0c7a1f8cc5b1bbf3f3a0c675f394fe
-
Filesize
16KB
MD5f1ea710e6ee163d841f0fb1e1e5d3520
SHA179e2b8ca52643b593690a5fc879289ec266c374d
SHA256a615dd0270156d962c3957fb3c34b8a0bbe57be826407c0c619b4edb6cbc2d9c
SHA5120eba69768ed32a26957d6e27dfedaae3a253232355b087e2fa364ac1b1e943e12d34a2602bb40da4317ef0b8cf657777e4717daa66498d5b1e367162363d4346
-
Filesize
261KB
MD53c3382d760a446fd115dbef6a11523b1
SHA16fb09a08be3cad1b78116e296b951fa86d202fb1
SHA2563f4f43bd2f7c055cfa676e93067ba0a978e855dda0194892f57cd259bf7b0212
SHA5125b2fb7abc278e3326fdc9be614ad6da7bcb9408f62331d81caa3305bc8b3a8fdae34ee2777edce500c11270f409ecab386e79907d96e18ea4c05aec361dfd4eb