Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe
Resource
win11-20240508-en
General
-
Target
af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe
-
Size
1.1MB
-
MD5
65b0afa5ac8b0f7b78bbd0632f88e405
-
SHA1
727de9a0f448ce7f43a18760c969ff16ece33610
-
SHA256
af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac
-
SHA512
2f28599f67b6528ca0905662cb2d1cd51e25dcb20675597de65cea7b2bf16498a27e9c30bd2ee7b70388c79d9f8fce876e5ee04c559135660b7e832ddfa46522
-
SSDEEP
24576:GqDEvCTbMWu7rQYlBQcBiT6rprG8auR2+b+HdiJUu:GTvC/MTQYxsWR7auR2+b+HoJU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133619646218104218" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-540404634-651139247-2967210625-1000\{A64F46B0-E65E-424E-B4C0-6BD83E095CDA} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 1616 chrome.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe -
Suspicious use of SendNotifyMessage 51 IoCs
pid Process 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 896 wrote to memory of 1616 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 80 PID 896 wrote to memory of 1616 896 af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe 80 PID 1616 wrote to memory of 4996 1616 chrome.exe 82 PID 1616 wrote to memory of 4996 1616 chrome.exe 82 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 220 1616 chrome.exe 83 PID 1616 wrote to memory of 4944 1616 chrome.exe 84 PID 1616 wrote to memory of 4944 1616 chrome.exe 84 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85 PID 1616 wrote to memory of 3944 1616 chrome.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe"C:\Users\Admin\AppData\Local\Temp\af02929433fd141a7201e10fdce0673146fbc3e632eddc794727a9f1d11c14ac.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff9368dab58,0x7ff9368dab68,0x7ff9368dab783⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:23⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:83⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2104 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:83⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:13⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:13⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4296 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:13⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4092 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:13⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4560 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:83⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4104 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:83⤵
- Modifies registry class
PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:83⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:83⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4912 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:83⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 --field-trial-handle=1896,i,5704478403662628792,544551666199779743,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD544a77eabb309094eb2d7b1153d95a285
SHA17362bb56212dd23cb47325ef7aa9d94c5b6355ab
SHA25643ef70fdfdeeca9266e73e1fc559ca6cd78eb81ef6aa66ee7fdab59702b9d78b
SHA51241304855a3eea67a2017cf34e64f2beaaec0c59bd94dd89616c68851264648b0ce640797adffffd973efd39f75ec32e0404cc2fd9198e2c7ad367ed32e5a03ae
-
Filesize
2KB
MD5b5b2eef600837658d6f92f685c5db042
SHA132424b585e9a405bc19bd490a0104348ee29433f
SHA2566e180df4e110d9c8833c1d303d23d6ce002f679be11f5972a6e7c04338a65aa6
SHA5124837aad1cf5599214c005504af280d8e3296607920bad4e23408e11f32888cfa83377d2d4675f2c86858668b2adc84adfeb3e537e27b85a81ce11c13dc670b4d
-
Filesize
2KB
MD57cc02e4d74a29b9067996666f2a6abb4
SHA13a10405542027acd91429ad7df824f17cdc0c68b
SHA256d5ad19e615663ca869628eee83c7a9dd8307ea5d822f6623b29c2cb5de174273
SHA512210adc4391a4d294bc52846c78bdc88497a0ee50febccaf6ec5486206c1064bb674329a5baa0e7025d9d796dd7100e85978b7f5567353011153a2dbd9b958d8f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD580161e61258186f067ae53851d1813c7
SHA15080fbe6d83d913cd13b13f3d8178b46bf49d905
SHA2567e9dc2d1dfa2d0277d6c5a9502fa6f591e23161ebca94a12d12096ba852f0e80
SHA512231ca250ea9428bc9ac382ba9cc3457da2c644054830123bead24a03da4209d233f51674a767e164229e4917a179c6d23d4b3e5b2d0c75fd222cddb43eacf665
-
Filesize
524B
MD5dcb687fecfa91ed97ac5913920b69f9b
SHA1cad456e5379681a3016dc189192c32fe67f36c4c
SHA256941285d9b4934c7b0ef2367177f3292c8da768e9673efbd7c54fac549c3ad42d
SHA51284eead513c4f362b5f882b0fb399d21ac4b73b3aa934afbe6b865b97a07dfb002c988113be39c825541c8da63eae55404c06ce4065db6100060b4836b3ba12a2
-
Filesize
7KB
MD574d6b3bf81f3d6919bd6c8aeca9f102d
SHA1adc8dc7fc014ff3ca289fb6b6e55e146c1c3d8b2
SHA256016b837955342a6b4b88336dc293d1bd9e4f370c647d03044f311d37def16a98
SHA512293ce9f65a8ce7995e8ccf8b4f88799956b2e164820017390509aefe30603adfeaa512943749daf88221b4bc20889b78cd9b8dd714126d85cb73807fe276d7a5
-
Filesize
16KB
MD50e016ffc1d2d5cef61dd90e6601e4246
SHA13d7327c308e1dabfc1dfc463d082b37d7e1dac6c
SHA256d5cf5a1b5cc59fc9fdc7fbc52f54450783563014f9d0c00e0ec820d388dd099e
SHA51241d4f3ca66489e6d0f20c0d6d12566ca051ec8c062b90f64f446e300289b123f473ee679a2bb076b70cde8d3c69a2f7544a361152e54312421e2756965b33378
-
Filesize
261KB
MD507347de3c1ff59183f92b63a40845556
SHA152828c7f3734607b265d37da240c23e45d254f65
SHA256d171559ee2e83b1ef2ffdd90e4b275fd69f4be460123c14664ab66ddac65224f
SHA51257ed62d5a80a4d5ad736b9c481f82c73804380f1ff39e5135da49399956cbbbaf0e607894574cb1c0be71e08b3757dfe32cbdee6e826fd79d23b1f51f4b5ea7e