Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/06/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe
Resource
win11-20240508-en
General
-
Target
13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe
-
Size
1.1MB
-
MD5
329272f0fe422e9225ee1f37902a2414
-
SHA1
3e1a54c2367b87162831b9f30f8ac12c84e40929
-
SHA256
13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce
-
SHA512
b22d923ce29dafc6e60b04c720248b689015deb4efc5d3307528cfc356b0a091e17e72ad75921997045e251626024265f150eafc2bd84b51904bdf03df9793aa
-
SSDEEP
24576:hqDEvCTbMWu7rQYlBQcBiT6rprG8auc2+b+HdiJUX:hTvC/MTQYxsWR7auc2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133629294361579666" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe 3760 chrome.exe 3760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 3852 chrome.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 3852 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 77 PID 2416 wrote to memory of 3852 2416 13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe 77 PID 3852 wrote to memory of 4556 3852 chrome.exe 80 PID 3852 wrote to memory of 4556 3852 chrome.exe 80 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 2616 3852 chrome.exe 81 PID 3852 wrote to memory of 4324 3852 chrome.exe 82 PID 3852 wrote to memory of 4324 3852 chrome.exe 82 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83 PID 3852 wrote to memory of 3916 3852 chrome.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe"C:\Users\Admin\AppData\Local\Temp\13e55226840ed7aed5ef8eb3aba50c4ba0a0d4ec7536a74fded27bc7d41cfcce.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb0943ab58,0x7ffb0943ab68,0x7ffb0943ab783⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:23⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:83⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:83⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:13⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:13⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:83⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3824 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:83⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4164 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:13⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4428 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:13⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4176 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:13⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1852 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:13⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1756 --field-trial-handle=1784,i,4308675437488874595,8985950594943152637,131072 /prefetch:13⤵PID:1552
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD54c2a4efb09db6897185bd6ef14f0ab58
SHA1c6ed456590a3d285c4ab9e3d441e0a4f705cc065
SHA2560338da3ff71347c426a7a4c8bd7b400dce656ebf6b9259ea52a13a0ffbf4c62b
SHA5129b6507d3357f5d3120a44eb225d655c49b99ab44a04d03fce50e29bff0bfc9f77accab1c3e87f5a3e2447f83962e767de46d6cebfcc377b09c06993a9d83ad38
-
Filesize
129KB
MD5534c5260a47f82e39d66c5a9e78c6f29
SHA159d354affe07c7a0a8969358d3caecfd8007e8d0
SHA256e1f29dc82b444a0ac6885b2109cc6ceb52abcbec859a96c26ab6fc154c1f5607
SHA5127da1bab4baec1697c9534aa4aba7026c4eb96cebd0543e77162c11226e341ec2e1e2709ea514b14d00668cc214718833566966654fea575ef6dfd0eef95775a2