Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
Snímek obrazovky 2024-05-02 190243.png
Resource
win10v2004-20240426-en
General
-
Target
Snímek obrazovky 2024-05-02 190243.png
-
Size
100KB
-
MD5
107adeff0096b20cdeea32348ca235a3
-
SHA1
9a4183aedc34fae5c35594bcd44306e6c688efd1
-
SHA256
1efd42f947bca4cfdf27607eefabcc7b5c3984bb6c8be291daa662a01b1d09b6
-
SHA512
cfa5139de71a850137b41104baec5b242bdea16462e1c45d54d894eecdfc8cb5bca76398e03b4175ed7cdd87f2923ba08e8fe7d360b3a7206512e21381d4dd7e
-
SSDEEP
1536:0xeyM+hFv4HHKqjQpeySrkxuKre14RzMYN3Jsie/14RzMYNb5rq03FObG:0xeyScHSrT4+YNZ5e94+YNvVObG
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 96 discord.com 98 discord.com 99 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133619232034909442" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3644 chrome.exe 3644 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe Token: SeShutdownPrivilege 3644 chrome.exe Token: SeCreatePagefilePrivilege 3644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe 3644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3644 wrote to memory of 4816 3644 chrome.exe 91 PID 3644 wrote to memory of 4816 3644 chrome.exe 91 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 5108 3644 chrome.exe 92 PID 3644 wrote to memory of 4076 3644 chrome.exe 93 PID 3644 wrote to memory of 4076 3644 chrome.exe 93 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94 PID 3644 wrote to memory of 3864 3644 chrome.exe 94
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Snímek obrazovky 2024-05-02 190243.png"1⤵PID:4920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd84f7ab58,0x7ffd84f7ab68,0x7ffd84f7ab782⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:22⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:82⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4344 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4528 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4684 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:82⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2112
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x238,0x23c,0x240,0x214,0x244,0x7ff68efdae48,0x7ff68efdae58,0x7ff68efdae683⤵PID:4424
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4880 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1052 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1840 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5372 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:82⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1192 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2300 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5200 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5712 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5304 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5684 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5932 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5544 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5672 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=5632 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=2384 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=1108 --field-trial-handle=1884,i,10532245239525515603,12187488085507202162,131072 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5e955953b801c04327c1e96c67dd3c618
SHA1f9061d3780f153e863478106bf1afd85132bccb0
SHA256e8965a2d52ef25918ebee58ab6971745d396177a7943acf1ed53a65bb4dddd45
SHA5126318ff1eb838954dd73dab5ed891d47f4f39089fa5e899d30183c32269c5620bd09d169af4cf8303e3d5c2ebab23cfe9ae5d9fa5c3281023abb009f66a25782a
-
Filesize
24KB
MD51fc15b901524b92722f9ff863f892a2b
SHA1cfd0a92d2c92614684524739630a35750c0103ec
SHA256da9a1e371b04099955c3a322baee3aeee1962c8b8dabe559703a7c2699968ef4
SHA5125cdc691e1be0d28c30819c0245b292d914f0a5beaed3f4fc42ac67ba22834808d66a0bfc663d625274631957c9b7760ada4088309b5941786c794edad1329c75
-
Filesize
69KB
MD5c356a0c771a0209d3482777edfc10768
SHA11ff2d992af8a6f19c30ecbe8f3591f26fe1cab08
SHA25632381f4549d36fa4583e599adc04056a4da80a6067c6805b7081c3f3f54a27ad
SHA512561084baf8d65579ead79e79c2c3920ef987384d52ecc11a2689aff95c54a6b823a0c4a8e5b910e60e569450e36563f53adb5796f261f13bbeea59130b81fe3c
-
Filesize
327KB
MD50720f6215808eb16e6ff559ba4fb936c
SHA1b65582f50a52c44d7eb4dcc0877b1c5991b9622c
SHA25620dcca78baa90dea28caaded4cfbe49fb93e212a20796302020ca75dc0e5d322
SHA512d9a01029a6af9e2d481edf2c519d91b10a034ddfaacc736b0956f0a0cb44041e57cccc2c37eb5b63f3bbcb598b39b1bbbb6796ab839b69891ffcd8694ec83221
-
Filesize
133KB
MD5a094c3592c8fbde4b1421a7faa347836
SHA1e35a2fdded2b8b87a4f0b3cd2d82ca760462a4c0
SHA256fd03d53e2fe88bcfa0eb3e6865b59ae41422c4d81a0b1285c8bf409101092df6
SHA512fa0b349306cc0ca104482a20a5e371797ff52bf7efcbc5ffc46add59570702a0f88bbd264abde517bfdb5d62e56e3adedd5d4db5252243b4200b6e4aef15434b
-
Filesize
27KB
MD5c37c423d43c3189f49190088ef7293f1
SHA19b5b8ee22bcecdd68a694262ea0641c1343e3ce2
SHA256eb896ab6729320e3200619fa00b6a34842ac290c21f94e52a41432712b62d1b6
SHA512717257b6c5607f10018508271f9cc0c09867d005d5127aa4510a3160ef5963a80ba0cb670ce9dfc0266464ec5674c61502f097a047caec6d9566c1b777afd532
-
Filesize
46KB
MD58020829282f8d6133736f8079e5665a1
SHA164ee9e05894d5f726b5719c7c35c10dfa8f863d3
SHA2564035124285f7d7e8588e4fe69bc1bfe663090e68ca6b1a6438c0cc9de22b6540
SHA51268a01229ceb0d09a76b646db8a7641c41b98cb89e8632d6a0261437fba750b01f8b8ff29c1f70242bb3cdba1850d9e8c31c5b7ef69ce5ad2323801b4f3e0503c
-
Filesize
19KB
MD50a7b330d35d1f90a931ba5a5841128d4
SHA109bdf4c09b15a13ab725e036cf5b77bbcdb413f0
SHA25688b3bb0764ee6edc9a3142807bf0cf44ed88ad7de857bd213102319e106701a3
SHA512e71bce3e697d9166369751ebdaf24fc7f215b94c2ffd3448b0364bbf34de00305318a45dc042e11e0cb0dbecfc4f59db532d4a9796e54f84a5e2e1e020c939a0
-
Filesize
96KB
MD5f6e79e8c666ef12e078f4993ae35fc22
SHA11000f2c61f9aa7565dde57e5aec1f8cb72df95fc
SHA256e6462ce39a8c2270f539dd16489608626eec2f0d6e7bb3808e58894aae8827c3
SHA5123afb0faa2b9e8d2b024424d7a13a153b391bd04cfc4e0e1a2501643e440b61ffebdaeaba431ce14551c0876e9ab8f7af26994a3efb1e2e8fe0a74fa0cb11b960
-
Filesize
151KB
MD52e2a310ccf9eff28e34cdc717858aa40
SHA11aa2261adbdbfab15ed99d25204701fa15166845
SHA25675e5470111fdcf66b3275f115bf2f92016ee33986e399f0edcecb7a87a934b3b
SHA5123d519aab91caa2522c927e27fbdeb13883a87770e67a88b6000d3ca9197e7425a7e6f2a82f0f787f729d1c7a5423554d059d7e0d6f1e956ad5537aeb77a17379
-
Filesize
168B
MD5c3b07df45d7b2fc167c32911240ab772
SHA181c3a07b729eeaade5fdb71f8c60dc1fb5391c97
SHA25669f73325b6367ed7643f7d3c5c71c20c421cbee2d411ca0b6e6b89e85f98c503
SHA51262a52ba9dc8a018c8b5f3f902697ff35987f862ed88801df1f5eb7ef121a3d5cb42ead0a9c9a47ef6341d10a8ec570c901982a4b26668a29266c1975874ed461
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_replit.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
1KB
MD5a01ed249f7f05f5ceaeb448eee3e20b3
SHA1a12acb0c967262abe0f8f1eef7112e0e7e94e415
SHA256f659819d0096c38ff765738c663bf821942e3e7de117445a9265d6f89117bdd9
SHA512d55cbdbca1546236f48f045d616a0bde720969a009f381c07e0b5efb36cb38940c18597334fa207f62a5f5bfb9db68362cbc1187de1088eb155efd2ee5763ca3
-
Filesize
6KB
MD530271c12b466a1aa9709fb827e71d1af
SHA1613caa9f3ba093051c6a60b88a50f6d6f22f631c
SHA256b803fd6b555a9ff8b7739c5f934fb549f6819291fee35acc6eff55eb1942e3b5
SHA51215270142da8d641e78982ddf4bf0c383397dea3587b91df9d3418b8d5b28f93ac74097d8d7a62f906969d89defd4cb8bcf09f053448a275fb0ccc5a38439aa74
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
689B
MD5b6ca2d0cab03ef994d152beef95e8649
SHA1be0657eb7e6c0c32111f657d99bfc0375a63ae39
SHA256a913f6ae927e49dec7e07c037a7ec2862caebd48c625dc1bc2d9409da6d7f36f
SHA512d06ce14ee904cf20643362b09e9febf2d1c6857d35b956419dbd13e08c12d89d92ad3db02ff4d4ce47452250da1b7c016f12584b56b27cc0f4dd0f1ba5a533bb
-
Filesize
354B
MD5b70e0dbc4127cfb46ec16ed163daa608
SHA1fda63850ebd4ca3b0e38e3b4f210505ffb34c06a
SHA2564eb5516202f0febbee9d8f724061dcc4cde6ba57658cd45d44a246d020e29661
SHA51285a23a7929f302dcdb9bc01b8eb9a4452e5d91ff5943ad29504c4df03717c70a451efe1190d48add4bb39b28bf291a60afe39cb5accb5101bd0a7baff1bdc49b
-
Filesize
2KB
MD5c0705f76dc0014700ce6da72212366cb
SHA1fab36ac152336e53ec6906943c45274feda4df83
SHA256c76080cc21f419474f624d427790da45377a95902149347b173060a71ddab897
SHA512c3ac7bcc0c1feab3fd116167bb67bff0e0f0ee8a9fa8675f2326bf86b49e74edb4242bd0cf2baed4591c9385cd30e4176a7da3cb3f751cc0601bedef0b71f8f2
-
Filesize
2KB
MD57ec10f84e31bb953ec553b481ac65cc0
SHA158c27e8194b09c71d7e464eb285c340d32ddc189
SHA256a06e4b73f5acb2b9f97ca68db767f5ba9561cc4cf64c3b7768cacd50469c2635
SHA512e1ce02cb09f83e7fbb9bea9d6cb65a38b3caec4bd096b884237dd4d97ab9a3be7d5d3aad10fd807edd7f74da97233f4fd603db3512964c3e14656ae8b2a11749
-
Filesize
7KB
MD56819e4523183f906a1562b20a4871ed9
SHA13e8b9990143a0f25ffe9a441a53dac6c41993525
SHA256212731eda45778c72140d304bc7b63a791a408474dbfe564db9bae05654f01f3
SHA512b66bdd2e13f300753c1eb8316f8f2d7c55b6f3830350352d3380bfa628ad19eef9da5e9e4af97a02b2b33dd0f6ec2b31ad7f7de2425bca6db719724151fd75b5
-
Filesize
7KB
MD52592dfc8a68de518907cd976e03af1d6
SHA14f13d34e78adc0a335ea79b65b92d03045790224
SHA256b1c42f720c761c91aef8a1d86b0c4b5982f7a9f7a313f7a64e17de8cf7fd30ae
SHA51276f5ea63838fb72602ffcef9f1df3bce22675b35e2aa6d411b1ab427cf5ca07096ae239ed9ff9d436ed726cce6dfa72d14773c0148e5a3576d4236a1784fb4f5
-
Filesize
7KB
MD5bf26194253da445db0bccf878850e0fd
SHA1c344273e7fa6ca3a9ee54469211aa1b08a9140f3
SHA25635e2cb1ac5648586bff4caae6626828e0f0e41c3f545034ae6b3938be1fab6c4
SHA5129cdb10d7490668aef93e11dd4c0eb95dfe1193c1a0483db4a87a7271566c2e8f020ee4ec3b828cd623f8ab915a4ab88ba926fc5e82dfaefbd2f3d0bc31ae170b
-
Filesize
8KB
MD599880a4c690881b0922169abeee4c425
SHA16bed89f0184d30667549d2f71069e51f873a694f
SHA25638331c4a90a17a474c52fe8aa9828c9104512367739d3dd8dd37082fadc3f568
SHA51206ba48b59492afa049afa1d94a025d1812c07bfab40f21eafe555edc1330683b3bcf6bf7baac888473ee5a830a5ed5940fc98e265e1198db76ae10272781163d
-
Filesize
16KB
MD55a7853eee554dcf82488c61ad149defc
SHA1aa8e62e3d4987c366b1cc0642c689ed1179ba825
SHA2566ebf9ad37dfdea0454424a2a66287915c3c3e9886c7df355df28ea9ff5ebb530
SHA5129bc50fb6e6e3b054380463052aa7a966a4ceb8a7cbd34d3d884af430e324326c289cd630c2866ff3b5ee556b805600147a40a25c8e17ab4f71877bb0e18a77b8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD594275bde03760c160b707ba8806ef545
SHA1aad8d87b0796de7baca00ab000b2b12a26427859
SHA256c58cb79fa4a9ade48ed821dd9f98957b0adfda7c2d267e3d07951c2d371aa968
SHA5122aabd49bc9f0ed3a5c690773f48a92dbbbd60264090a0db2fe0f166f8c20c767a74d1e1d7cc6a46c34cfbd1587ddb565e791d494cd0d2ca375ab8cc11cd8f930
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize120B
MD5d01642714d632486275584d3c385d6fa
SHA11035374674d58f01f159994363498a3afc428a32
SHA2560e881ddc91be6ad5fb184d67ea0165113f32b84a2a897dfba6521b0a0450fda9
SHA512ce011e992a57821053fd2a0a13b68142eb0888651de8d69892ebefca83a5572c86cc0930d316676fb452f6bbc213658f174507f65ac58386ef6897fe506194e1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe590054.TMP
Filesize120B
MD57abb89f49542611c7d7b1622d91df6d1
SHA1bd2085ab4a9794efe42aefaedebaf7a4c046f9f3
SHA256dcbf8aac063b800ca57a37e4a91cdf8c89bccd5d93183272b106edc14743fd5c
SHA512566ac84bea0d0013d5fe4c663c9be29f9aba5350436c8f0edbaccd34efc802698f54c8cbf276f792399cd56476b6e81cc3d07ef02729575e530209ee3ab6e9f9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c88326c16da025a4095d66138d90a725ead722eb\77fcd456-411a-4c7a-b85f-3c7e94470f20\index-dir\the-real-index
Filesize72B
MD5a07d59570b489ee61822023a656d1fa2
SHA162a7c6a6343b60204f7dbb6a5c163d8955e82b0b
SHA25664ba831667fade78ef47f164d17767c76b0aac2e597ecc9f9cd24ec69bcc16c4
SHA512d74aa02cc658fc61d05ad7786a39a045a398271832f2a0d5774ab80d718dc660564e7e43a6cc802b0958f089de3fc7269bc92041dc1ca0980cf03b56b44c92a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c88326c16da025a4095d66138d90a725ead722eb\77fcd456-411a-4c7a-b85f-3c7e94470f20\index-dir\the-real-index~RFe597749.TMP
Filesize48B
MD50e60cd639ee0167fb148b81daaa06fa5
SHA135beee914addc3ca705f980873f7850655a5b1b7
SHA256a33de02e784bac90271456aed579486b82bfea8fed6d71c2e2289c3ca15cdee5
SHA512587174d8fe15d6a4674eb5d1ebc8f9126227f9db5adcb238ad4f336dbfb429806f196258d9ee2f8fa031372900eb6b6fa6e72ae5010fb5436fc2ba81e85050f2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c88326c16da025a4095d66138d90a725ead722eb\index.txt
Filesize102B
MD5d3835370d5c5d9dc551d76566eb61254
SHA17e26144a690c4f10d20e9eb45be4473da1a25c38
SHA2566326d53177bd9071407020fdc4428c989eccb16830600484e9e25039d3289f6c
SHA51260597bdc2993d7773019370c72e77334274fac761e97987351c34b4d50e2a3b8023e2f2eb190be0d30137140131d90b7487bae3fcb4652f04ce2ba0268b0462f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c88326c16da025a4095d66138d90a725ead722eb\index.txt~RFe597778.TMP
Filesize108B
MD53c74ebe30aaa3b0f3c6146dc421e25c0
SHA12081c206eabc1f65b3a14544b9bb35af8301ede3
SHA2569acccf07832ec190cd72b3c8be9fd75de65f106f8bd16269d4f748ebc567d4fd
SHA5127e8a02a0facc857d09e28e4afacec876f1df0797858c032fc87c16ec7dbf4c0ce67a689a0d72a991df880de90543d8c09eaf944376b079fce7724c7f14a7a7cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD57fa38c26f9f94a731a606c8dcb7df975
SHA159953ca2f70028e90fdeb572d24614ffc7ef1c80
SHA256aec589dcad0fdfee30698c5aae3fa041101c363f6f991e1daa90091dfe50ed32
SHA5126de4765f37c85b1b9cd7c30abbcc82e6c22c3e06401b9551004b45305a1fd764deab8e94ae877d1bca9e4507c2ffc66edd6b8abc7f613429b13467d71acf23dc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f919d1c1-1b31-41b9-bf20-aedb3529f77c.tmp
Filesize8KB
MD5b52d57a501e2762f44a688ffe6e597a6
SHA1386ec679b7506e9ff57366da06c5ce260d723c57
SHA25637d630c90f856c87c08e67a13421003a92d6f0d767c985bf29f1b9464008c691
SHA5124b98727957d8b6c022d217dcff4fb85c81abb8e18135014dab59b6f7ee0a0f4ee73a17ff0bc32c2e9333595ba8e5e5166b1be685c92f8f2666943d48bad70c23
-
Filesize
260KB
MD56363916227c14deb260cdb0c630901ac
SHA10f04843198d8942f279c670344d30218c077bf11
SHA256d43f3b4a2ea635964be05082c9b8530f3ad6e1061b03d36da6f35b5b2fb11ef4
SHA5124c0f3d755362bd39b3e850dc751162e05a674e9935728ba82937d064034da5974846838d3df8563506650192ff95230702461a76e847bb94f4f47480ffe0f69a