Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe
Resource
win11-20240508-en
General
-
Target
826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe
-
Size
1.1MB
-
MD5
94c3e9dc44b8776921399f6dd944dea8
-
SHA1
d3f19789e31ec09ee3b3394f865ef80b3343cd4f
-
SHA256
826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded
-
SHA512
fc37b31bc489465a90857987e9a8fdb3a797ec0d2ea22ccb0cecaec670f29e5372acfba1af966b4df50cacee9ae57f0a587941e4c0ac7fb29fd199339249ac02
-
SSDEEP
24576:DqDEvCTbMWu7rQYlBQcBiT6rprG8aus2+b+HdiJUX:DTvC/MTQYxsWR7aus2+b+HoJU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133628898533721012" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5112 chrome.exe 5112 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe Token: SeShutdownPrivilege 5112 chrome.exe Token: SeCreatePagefilePrivilege 5112 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 5112 chrome.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 5112 chrome.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 5112 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 91 PID 3024 wrote to memory of 5112 3024 826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe 91 PID 5112 wrote to memory of 3852 5112 chrome.exe 94 PID 5112 wrote to memory of 3852 5112 chrome.exe 94 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 3756 5112 chrome.exe 95 PID 5112 wrote to memory of 1712 5112 chrome.exe 96 PID 5112 wrote to memory of 1712 5112 chrome.exe 96 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97 PID 5112 wrote to memory of 2032 5112 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe"C:\Users\Admin\AppData\Local\Temp\826c5e2b824cfb2bc574de9257052376b7b32729aeb80742842e4a92ada0dded.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffeafe5ab58,0x7ffeafe5ab68,0x7ffeafe5ab783⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:23⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:83⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:83⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:13⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:13⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:83⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:83⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4364 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:13⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2216 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:13⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3128 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:13⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1844 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:13⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5100 --field-trial-handle=1772,i,6229819584581475251,15072075359513536844,131072 /prefetch:13⤵PID:636
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4116,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=3900 /prefetch:81⤵PID:3620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD55d9e80981c4c47684e76cde157b4d72d
SHA17bcd7a69304837def03c94980b3f4b5b801645a2
SHA25643640a72a2f4df5f64770cd36234cdc6298fce6fe087ac8c3eb2da374408290d
SHA512cba29766e691dd640c05564c367de48c2f6306b68db0bda4049f83241dc89703578f7f8280ae3393a64a0e1940c0225406e86b745bc3e3922452b361ff0b4eef
-
Filesize
255KB
MD52f7292bd9f9a1129dd147b754567be15
SHA1fbc9a328d238c292147d2af6d35da06e5d191a2c
SHA256c46db1c6401caa0c16354a3749491d46a8ec75388108399c44a701a7ce9b270e
SHA5121b79aa564b84d211857588b4295029887cb03fd065806a983a06a2d3123498ab9c46edef3b2e1291649ca05286879bd5638c3a2043b53319bed9ecc3777cffcc