Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/06/2024, 08:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win11-20240508-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133636901903299875" chrome.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 1496 msedge.exe 1496 msedge.exe 3432 msedge.exe 3432 msedge.exe 440 identity_helper.exe 440 identity_helper.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4684 1496 msedge.exe 77 PID 1496 wrote to memory of 4684 1496 msedge.exe 77 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4520 1496 msedge.exe 78 PID 1496 wrote to memory of 4416 1496 msedge.exe 79 PID 1496 wrote to memory of 4416 1496 msedge.exe 79 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80 PID 1496 wrote to memory of 4768 1496 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe37193cb8,0x7ffe37193cc8,0x7ffe37193cd82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,480230007715048052,14869265850272467295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe366eab58,0x7ffe366eab68,0x7ffe366eab782⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:22⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:12⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:12⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4200 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:82⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4376 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:12⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4916 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4348 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5080 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4752 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5192 --field-trial-handle=1820,i,10630303864408590474,17266219803261706185,131072 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD53e909c4876703ae34e3e47ffd789331a
SHA15e9422ff4a26d1d60c26ffc945515aa5eb1f14ae
SHA2561768931236cfbd27619267ee39ff9be3f186b39add90a3c94b3520a735f6bed2
SHA5120f18f48f0aeaddafa8942872d86bdfc71ee794cec955072918102976befe1faaa34fbf0946881a3d61a61bf008a7d4e02dbfc50f6a84afc8c2ff60a3a835554e
-
Filesize
129KB
MD5344fc52846b60c70ec01f5a5a0cdebd1
SHA173b00734987feeb2fc6a08d19b583d2b941032dd
SHA2564f2e908cbe1135e75f69b3ed86b31cf169cacf688ae7e38ef8a3269b02366380
SHA512fd4ac17dd901453ae5c3443f12c49e38f756b9e7ef681787c3090eff28ff2bb9137e2e2687d4414349dbed9e5eca06a25556ee8fef193c646d8f417692b0f7af
-
Filesize
152B
MD50d84d1490aa9f725b68407eab8f0030e
SHA183964574467b7422e160af34ef024d1821d6d1c3
SHA25640c09bb0248add089873d1117aadefb46c1b4e23241ba4621f707312de9c829e
SHA512f84552335ff96b5b4841ec26e222c24af79b6d0271d27ad05a9dfcee254a7b9e9019e7fac0def1245a74754fae81f7126499bf1001615073284052aaa949fa00
-
Filesize
152B
MD50c705388d79c00418e5c1751159353e3
SHA1aaeafebce5483626ef82813d286511c1f353f861
SHA256697bd270be634688c48210bee7c5111d7897fd71a6af0bbb2141cefd2f8e4a4d
SHA512c1614e79650ab9822c4e175ba528ea4efadc7a6313204e4e69b4a9bd06327fb92f56fba95f2595885b1604ca8d8f6b282ab542988995c674d89901da2bc4186f
-
Filesize
5KB
MD56a484e4544d3d263194513e6109f5136
SHA11e8e24a6eff756fa433c9a2eadf67116d79ffa76
SHA25658fb5dba99db4bf2dc8f46003493eee6188c324e40bd5c67b46cf77b56cb37fb
SHA5124a7d65d267053ee3bb0c8c9ee360f4a04e1d20fcec71fbd11a10cb0afb65bf6a3ff0c71e4a54cb72bb5b49c67fd9980236b29cc856a1b940b6003254ab68c9f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5e3bd242ebc89beaa68cc496bba6b3d77
SHA136667df35589deafa7d675a7587fb65253c5ef1a
SHA256d95bfc4ae318aa0b942178f973ea004cc12376a0ae81fdf023c6383a0697f67b
SHA5129ebdf30403afe131a93d06f70f610dd419455efd4524ba77e9c89dae397e3404550263add2f9ff267c451fff23996a3fb5072584adccde06180102cf01df4dfb
-
Filesize
8KB
MD59da79350bf4f1bd4ca00f5a039ebd265
SHA1dadccf11d28d25b7734c995b592736baaca4b214
SHA256904e213c39ff3dd6fe0f9338aed0cbf20632df91b13764e173ef063f153a0b1c
SHA512c443233756c96fb9808c21f4c46d11ff522adfc61432ca831857ced087c9094a22a342b0d5d30e0b493fa735b3349bed80d0e87c2d8fee282a17e18be487bf9d
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58