Analysis
-
max time kernel
299s -
max time network
293s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04-07-2024 22:38
Static task
static1
Behavioral task
behavioral1
Sample
6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe
Resource
win10-20240404-en
General
-
Target
6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe
-
Size
1.1MB
-
MD5
619f9806ab2fad61f931922dd30ede7f
-
SHA1
e37a5d0abee7f33f31001dfb6352f7282fae174a
-
SHA256
6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac
-
SHA512
3b6df4cd430ac31e10a4d957a995073bfe582fd3965d69a108d62d0d6429a26083e533fc954e734b1c1e16450ea258e86bec6923a24373ab842f231600ff6935
-
SSDEEP
24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8au/2+b+HdiJUX:gTvC/MTQYxsWR7au/2+b+HoJU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133646063402617485" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4200 chrome.exe 4200 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe Token: SeShutdownPrivilege 4200 chrome.exe Token: SeCreatePagefilePrivilege 4200 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4200 chrome.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4200 chrome.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 4200 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 72 PID 4472 wrote to memory of 4200 4472 6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe 72 PID 4200 wrote to memory of 3148 4200 chrome.exe 74 PID 4200 wrote to memory of 3148 4200 chrome.exe 74 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 4204 4200 chrome.exe 76 PID 4200 wrote to memory of 944 4200 chrome.exe 77 PID 4200 wrote to memory of 944 4200 chrome.exe 77 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78 PID 4200 wrote to memory of 2764 4200 chrome.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe"C:\Users\Admin\AppData\Local\Temp\6948115e88783353bec40bf54a6d10c614fd1332848e6ce2f8a1932c918998ac.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc85a89758,0x7ffc85a89768,0x7ffc85a897783⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:23⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:83⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:83⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:13⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:13⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:13⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:83⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:83⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:83⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3264 --field-trial-handle=1728,i,15671183454155518243,14443376536057650332,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD536a80d7b40af541ccb2bffda41b86b99
SHA11e096c47161c09252fb46c0528bd65f78c0773a0
SHA256efe756782244faab0cce5254c3c4ea05025039ecb0ba3603e0f4854953e4211b
SHA512953b815c9c74651f4dbce24c1d1e6b5d58df3d215d823012bb3ddaa6dc572c503b011ac164bc47e16710d6da4677d5bd0a1f4a610a421a512dbbb2f099ffb213
-
Filesize
1KB
MD50972ee8d22e409656f3497fb3d4ef0d2
SHA134f033074b6797d64a0ef8a962aadb1042636d14
SHA256371982bfef9bbbddaad8a6e0c25d6cda57d605d188cd0328ecdeda470025e181
SHA512f6a0b98ec77879f6992c876222bbf073de2374c266c9993f596440f6e948df6a9eec739f6f9e04752686772a72950238c260a4fa5e0c51366750b3223282dd53
-
Filesize
2KB
MD53ab3959836367f782b1971015eb7074b
SHA19725f10141fd6cfc3c7bd9e0f49fee9475da913c
SHA25661fcd0d56025a2bc4b4b89adac6fe4f304a3b8194a603a5bd98fbbbbdba4c0e6
SHA5123929deec7ba014084ae0f8b97ea281e37601ee82bfca5c9cd45d524cc6cfbf0c2e044715c16d4110ca2e2765af145b9b1d728565f655c9589f488eae37cd9bf3
-
Filesize
707B
MD5445f250e618eabeb425b5038628260af
SHA1012f5bf9ecf6abbd5b64ed2b1c5426c2b75f9c44
SHA256f0a3bacd163b3f343718962b3b6ea21bd2d05858e732387873817b7f29d1325f
SHA512d2d47b9d29c563cd07ad0f2acd18c5a75b0acf6ae0eba6235a46c8bb5bfc643d6e22ce07ee7483346fd25d07b589a899b699777ae177b8c7bd17a92e4cc65ef5
-
Filesize
6KB
MD5d5c7ae6de7595f1be845a908dae92f4f
SHA1e54495c41fcf264dab797caa7a97baf8be23d6e2
SHA2568f194d14642719100b83b67e0d3baaca465b1adfce3b59f45fde67d143f96c10
SHA5120b23c4622cb4c45941b5a7c1b4fd329786d801e26b2407f3cef55c24ec431b424f20fb88385a0ea2612a57031dbefdacefb0960ed77f977ca41ec8bd35ee5a7c
-
Filesize
6KB
MD5ebe82d2ba24c49d415036a53cccf9d54
SHA145bb4ba9727130020dbab41262e578576341e9d6
SHA256ce519af592bcf4d5025b1b4d8e76d0ad3505dcf49da46790f4b2843a720a9697
SHA51227428d7460f16a2b39b86a5fedc206660c482bcfa3b32508e269ea8638c2c06e4d8badd5f63d73a02bbfc2bc2060678e954e84b75e0e46d9bb118f4d70714d7c
-
Filesize
6KB
MD5d3e9ddb9de4111b1325e2b085b3e7e77
SHA180c1bfe76154a5095d56e8d872ba15a66daf5fd5
SHA2562f2b91c34c78e1cd944d907d668d02d0e0d8b711a8c172ab3602b41cd49d790e
SHA5121a29aea2a16d54e6ec6ae6ab2d313a8d3482cfc890d4ffbc0f5996656689e93f05266e4065d6e07a37ec19b55d4675c4889a7695bdb73a07d96c783f3b12b55b
-
Filesize
12KB
MD580393050284583653da0420fbcf3079e
SHA1bf62d33ded94ccfbc5302e627f4b654bd9d786da
SHA256cf5c5ee12a4546552f281d8ff318304be7939688fd7130ca1e40a578bf3e4984
SHA512608cc8d94c2b30a0feb6fba1d25252a8f07062526948c5f687fddcff2b53628556388837403f517bdd0702602f73f5621416c73589faef3851fcf3a299033817
-
Filesize
287KB
MD57b552a3ac363ea38f63f5486021ee37d
SHA1f71c8073bbf73a13dfed2bed2187663aff6fb02c
SHA256196c9fd486b8f53c2c21efb470658914862f373553b7814adb81179b8baa48b5
SHA512a2e663626bfc325cbc1c30650303c76697a334e16397a062c67568b9dbbced41128898c762f92c98ccea971c8a80c2683fcf1153d72159722396eec0a306292f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd