Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
19-07-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
815FfbUcxaL._AC_SL1500_.jpg
Resource
win10-20240611-en
General
-
Target
815FfbUcxaL._AC_SL1500_.jpg
-
Size
132KB
-
MD5
f4d34a38ed230c81f833e934a6625c1a
-
SHA1
1893f5c01103e0b2a594260364e04a2f1e6f9859
-
SHA256
779e2ca6cb016891963c2ea61d205eec05f4f04b34c58d9409e0965d0a018acd
-
SHA512
513eb470e2b1831c27a0d2d05b62b42e03bc62202e1fa4fc11e73012e45e88e0fdd979ddaaa563758c9a25724548fb9893d8fe53a99d438792445cb469a94975
-
SSDEEP
3072:JHVCz2vD1KfX1gT78YwNC9LHCfEnLTCzV1Dh5LeVX:JHVnKflgPwN4LfLWh1NpeVX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133658746459727860" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe Token: SeShutdownPrivilege 2028 chrome.exe Token: SeCreatePagefilePrivilege 2028 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 724 2028 chrome.exe 74 PID 2028 wrote to memory of 724 2028 chrome.exe 74 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4568 2028 chrome.exe 77 PID 2028 wrote to memory of 4364 2028 chrome.exe 78 PID 2028 wrote to memory of 4364 2028 chrome.exe 78 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79 PID 2028 wrote to memory of 3620 2028 chrome.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\815FfbUcxaL._AC_SL1500_.jpg1⤵PID:1572
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff25ea9758,0x7fff25ea9768,0x7fff25ea97782⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:22⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4624 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3832 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5292 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5160 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4516 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3048 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3016 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5268 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5540 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4936 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5948 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=2508 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3168 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=5936 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:12⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 --field-trial-handle=1860,i,5629613862611170036,10046957436874769902,131072 /prefetch:82⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5b7ea4a546ff0b0426df85e1c877fc2fb
SHA1d175615c8d9f42fc9d387908baa9e412715a4408
SHA256ec4a52341f2098f183a2ef01bdb8b7d1ba3c30e16a6abe3a7b0a31401f8fb94a
SHA51265cce956c687b036b9993d6589f0ff035f1571e704d7462ba74eb1bb9df4b5c1542b9789ce22993873dcd0f4689bc047160a4af28ebe38a17ea65edb61dea6c9
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
83KB
MD595ad70b0720495f26f4b7dc7aa152c13
SHA1d325d177460b579980d6b36a4da2defbc709d6ce
SHA2567d40765179bc45d7b2a36b9f0d49d12c2048abb154ed0ecfaa2433417fd0cdbc
SHA512ca9f7e4fd11ce28a5eacee9cda062c8418b4d6cb440ed82328c03d7c1d1835d7aa175a2ac5e35ce2ec3ab6a37ed2fae0bf2eb61c7b08199299b6dae9e5194fc6
-
Filesize
480B
MD5b9acb8632431ad31bc059b0188232f7b
SHA1d109f5addefecad369171891db21861876005605
SHA2565468b29b8bd1c918bff82b029355769f22ccb1be87ad6322fa077f2dc3af0d54
SHA5121a738ce3d9a1e14c8e99fd08a46b404cc90b59d422f31c445e70f122583420e98c39c2e7d12631f5a064b80d02b0ed0707bdf1d3d03a8f6a61cf0815fabc11ab
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_tjqjq.dwhitdoedsrag.org_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
3KB
MD57e8ddc6b55fad3d29d6621bec8d4e2ad
SHA1a3724860fe3bf5778b98635ee4b798d71bfac3a2
SHA256325d470a74c47aa1a1483abd4cce52beb114609ac1170bd3371962756bdf5078
SHA5120e202dd0d57fc78756429ce7c02b4a57d8833f80d0a6633323117c25b679d0c2175dfed4c7eddc9e766fe068e194bb4f39c2206ae60ab93d5e66d11a9c4e2548
-
Filesize
873B
MD53340015304ab6aeda1fe4a7828cfd706
SHA182da7e763379ac99a8761055b7ad4194e7b6946f
SHA256a279c55fb06afc2033c48fbd6ab3013ceae3c3284f48ef7c8b2b2808963cbbab
SHA5125f236d306f8ac1bac76487c4b9826f5b994eff2398b6d6a5161f219f711f9549f17c75308eb1a309005466e0e6694a79b560df730734ca0362d221f64acf13b2
-
Filesize
4KB
MD5e4aa3286e92fb9fb6af617f648e5196c
SHA1287f9d9df12dfdb152283ce45cac82dd8aa8651b
SHA25694abe739eb646ee667ea442668558d9b76c48f54ea8111f57fc9c4109912ee31
SHA51252c5cbb800913a6eedddd5f65f902a52d9d5ab4846acf44b350504326ab1203dd997a6554634313546f71cd986fac9f9bb285a11bd78acf1e616f005c4841e58
-
Filesize
1KB
MD5f5c253ab94f191691df916d17895f446
SHA10eb8b2d843ebaa016052177ed9c8b537129bf89c
SHA256b837bb9d72e589e188a6eb9680c9497f09bba8e298b65f9bade3b80a82c768bd
SHA512cdaf3842700c29e550410103d8e91161d9d495cb0b61983a49008b9579a2b2b59079eae8365c2501be9433b7ac3a71d72e96a1000c2ed4e7879e91c7ab772291
-
Filesize
202B
MD54df61e48f6c733231fb95dd5cf6ce8a2
SHA108a67fede0c9b7875c525824fc5775a9eec32397
SHA256350e372a0567b5b40a2cfd5412c407fac40e252be04534d3bf386f872d623bd9
SHA5129730722df0284dec3a533636c759efc74892873c23ef67d5588d01dca786e56fc2b5c49b6a6c1795ed59f0bbc52df057796b711d3b8fdd39832900a5768706a9
-
Filesize
533B
MD53d0b9423854aad6b9484602193c3dc52
SHA116a68d424c478ba9019ebbd2aa7bf1d91ee88527
SHA256e5e0aee95bdfb89b3ca3cc286fc86803174109130b382d270bdf96c53b177c37
SHA512e6a46a6de56fe05934c6f40311ad7762ecb40c3c96cf0fa970b0aa8a6cbef669225ef689652b2de16f5678bc7e2333dad36317d2c8a024ab424f10d619fb5c9b
-
Filesize
202B
MD5016b0ce45f44cc43452a5b76ae5cab95
SHA16e48420074d6c63656e4ac727e242a14a3a5fe5c
SHA256ba25eb2802c58e08338c8539ef78d777ee8ad5647afad29267e592f26ffbf5ce
SHA512efbe458a297c7a7b3586f33a3ba83ea721f7ca393a7cb86a2ee5e5de586f1b4a36d1bb322a7baed48c3607f6f446ec64a1ac9321b29c8d1144b0166332d712e4
-
Filesize
1KB
MD56ec94c2f988792589cdd88aea0127a98
SHA117af18e5a83253589ef282a56ea00b3505e6a401
SHA2563f6802fd18e88451b57fff49bae1610052abf13292998af3aaf89bdf848c376d
SHA5128f5150723dfbc0451ed85cc8f1bda152f8d89998f24975fa1108a50a3edb24af392c6cb5498634cb6ccc148213b7aabad9c4b1bb3c9f6a5f8b302767a96258f1
-
Filesize
1KB
MD5d4d8a41f80d1d26f9cf82ec2e32f0f06
SHA1eb30fa8a80eb56e59ab3fd6395aedec340b53a90
SHA256c2dc2c2d73beb31573499de202becaa64b117d6fdac5fd80fce8d527637152f0
SHA512e44afcde1a1966b98ace2044ddb7a91a3cbc0dafcf0c6515fae3944665c6d3ba52ab54b9927269be49850946d07ea6c9e52a698011391d9d5af9991788425b4a
-
Filesize
6KB
MD5c07f18cec26896ec4dc20ba1fe40d75e
SHA1a45bc44fdf30eecc7d3b6966981739a46df12d06
SHA256aff5260645f7772973938c4ef36e9b47d2a4d5da4eba017583250004abc0a830
SHA51268c0321b0a107be843af8299d7d4bc8a7c31b0ff2acd80ef8c0ac8cb1454095e004caf797d75e4eddbc28c8e6f5989eea9b67a63b2e2af4915de51ae90066365
-
Filesize
6KB
MD565bca18417c1818484e2a34e85f176f4
SHA1ea8fbbf683ad4b8f2e008f023211c52ac5b268ba
SHA2567ddc99b22b33fe587a06b53a9ca191fb1033141987f8c3ac5d430ccb25dfdf4a
SHA512fc7310da7cdb57de5dba0229bd4136481c21a7549230a5f66a4c66bec3615112be1fc20c55eff7af15dae06deffab5f8b1c343b4583271a40e60c7452f79eea4
-
Filesize
7KB
MD55be3c66e81efbfdbf3b7b1dd7f2b0099
SHA18bf039ad070beda4e199781e1421b05ca412f226
SHA256d977c80957fedb8558b9f68cad0fe3466676abb14dccae1b23c15de3a2f5a284
SHA5127917bd4aec57159d5ce464034e339ca18a4789b3702e654e313192863089fc249ec925992ec89b98e24360126ffb0d62b30808f28e1960e94ad0440f0a7bfa5c
-
Filesize
7KB
MD5effa324a2436791545213a2710657b60
SHA1938183a9d92b166c858f0b9eb87945772483c11b
SHA25697ec418746c65648f3c3f0318f27f4a7509b76328e67d2b839945cddd91ac378
SHA5120aef5f803a24fab3d782cc867dbb50e771c63f81d7d973a3894ea853382abacc053b68f998158e2f3af7c5c8757eec49255f26b2ad5acf1e4ec5a5720ac79f46
-
Filesize
5KB
MD5028983aa56f2aa2e28303b23ea385835
SHA1886eb735311e20bbab5a02624ff2efbdfffce371
SHA256901850e2d8c6277240ce7efcf17c550e3c4fa43c6b4c53574f384e96c1999924
SHA5128861d9d6edbb3bc04bab7cf10bc17f98d6e0107287532bebbfbd9501d97b9d4a1a1d12085b9ee79a0b2e9a634fd0dd00853c5c312fa6795127a436547bd3e5f8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5f2f60367fb37b3f0cdf26ed9bdb36dc6
SHA18002178cc1f7cb47a332c6be134d2c90e4eeb380
SHA256572020595564f235a4861fdc5fe5833afc79d367dc06932f36e347fabf60eb65
SHA5127f0aac6805cb42e920b65ac246a6bf43fee703533ea896192df3b65f03da3c4bda8f47a08f78219437afb6133ef1cce48991cf8b0ea2b467ca8cb822d0752215
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe593762.TMP
Filesize48B
MD56bce6a9edcc299a3b33e16c42e9eddb2
SHA1565521f9f381ce4df87712ac433919cb3683a4e1
SHA2562b0ff191632ad3b7219c93ddacbd8c4aabe15d98c926b6d9b32430caa5fb2664
SHA5128491f5f5050f4de52ed19ad13ac9823b289b67580ef5b39b5a430254fc25b5cfad75c8f617750bad03a8fdc6feeb08c3396f251212a6db44ba91d0d0f26f3f1a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a6a365c0-c88e-4897-b457-c46d3a906853.tmp
Filesize6KB
MD58cd359710498bd97b7876e2c5cd42241
SHA148d2398745b2ba88df534ad897ef9257e83098f8
SHA256bc2139fb0895a04edc0fbb909a8bf6c21554d0e77145d3d45d497a2a714b7cc8
SHA51249630da1b03570dcc307e176ced780c126941a8255b58d68d15ff86e1e6e714ce7d982fab2ce0e514bf3e394bfe9f180a61f22aabf9bdf4a99a2f00bcefcc7a2
-
Filesize
150KB
MD50b2889cfd3962d014c212fc50f67da83
SHA1f75cd1c8c58aab3e774d1353a4529426f64eef51
SHA2561446894bfc5640119b6cd617cc1cf6b780f37f1ef2c1dc52a5f6387390133191
SHA5129218055d4d80b2481c5e1d31758a5d04e936b7c6f5946e36fdff549b53add925432e74d94b04ac28766c04deaaaed0c2f575a0860c351cc3939d85be470acf20
-
Filesize
304KB
MD5b1a6bc587a0f1a063641a88840cb2855
SHA18cbdeee6b7eb6c26298946d8fea54e88f042cade
SHA25618ac4a53f07a3dc543d87e3f5c3b0d5f91ac11ffa3a287fc14ffce6e5b5fb2ac
SHA512b791909f499b436bf369b232a304d17fb2cc41c5042466ee362b120bd71d4abaebfbb2c97315089b8b63e3ca9c7b78970b4ea8a2872ffead0fde07a172ec5802
-
Filesize
304KB
MD556e2a895927dbb4e86859ab797a99d31
SHA1a4313454d72f0fbd57618f70f97f1d8012ffdc18
SHA2569e5c3c6103c4281b3a2aa07fba32390ea0d8be2f0977907b8c1d12fd5de57f02
SHA51228451e8dc33ecc24f8ef072d6511b6e74901f136c77e27779e64adcc3c95e6ef4a428d2cabf59af297f5476d43bc004f2a7ead6451d73c76501271eef8b7393a
-
Filesize
304KB
MD5e57e25a55b305cf7dc80337e53acef71
SHA154d748eab506bf9ccdaf646981cab51957adddae
SHA256037e2296d4449708ebdcce53724726e2654de0237f6aa1a3d668006d121e19e9
SHA5125126cffce4bdf85383d8a6b0956333006d66eb9335df632ecc2cfb14aa29565155933596491600e386b8cc6aecd7978bf375811f536e04ba97a6949cf29f0327
-
Filesize
304KB
MD5f2f50e06d520c716c5873de06ab7d1a1
SHA1df9aade01d2cb4c45fbdcf5b2a070fbff88b608a
SHA25603f013ded846ab1691847c7f3c95d3697904ba72f153373323b4baae286d530e
SHA5127a8765be428fe9a56ff46ff65c811dcd0e8a331f36f0b0c64c19432897c1ecbfaa2285516b295f082cce5e1d60a1322db738abda2fcf46f84dce9c139a3dc4cc
-
Filesize
322KB
MD52cb69855d327ab9acc4827b26fa951c1
SHA1937f0a4ccd9ab409a6276ced883995b696d4ee0d
SHA2561bcf7bc60e7d0937f44b51776e97665731164ef68e3d27b9d85e5c178b13d5f5
SHA512135239014732106e5f85c6477327b355acb6cb37bb36835e86a2be9d421f28daf5e091f2d45731868d5f93c55905013b7c100b3b144596ecb61422657666582b
-
Filesize
304KB
MD5aec177c663c01916bde5c2fd7c273ae7
SHA1cd7f2745f1ef26569ac39dc82ddcb71a53d6b98d
SHA2563185cee3458d42b831e7e19ef06ba3bf77ceaf798e6368708cd9d6fc5204ad62
SHA512fa37980889c0db7c0e8169e9d7063dfac9576e093c794770d99d2c8118e7dad50392c06d3db33e1063a6f49f3a0b80ff6c3e4c5ac2e00f47541b56c89737d92c
-
Filesize
100KB
MD59efc005070ecea3cdf56290aee544a33
SHA1b8e75679e4e9f94ad8158285e1f12c18517b492f
SHA256e99bfb7141e9515ed70a2fd85e257b7f2c637d87e37bd87501bb21dea267c686
SHA512cc1fa0c164eba0357b7c80d6500c964f6b8ef81dd7e488d61a57904a83617aacf409d24f43d635fb34a7db81a0cdb7318ad18c6029377a028fda5ef9fb1216b4
-
Filesize
107KB
MD559762bad735aa2cd682284c891fa01e4
SHA154ab2e51cfbc5046ffa5b188f0335cf1207c09da
SHA256c33223982e563d42b05a596e7be880837aca12e10b3141ad444c2c6466fd508a
SHA512e6a3bd9b0f83ed345c5cc2d4765ef4360b0f191c71baf24dba28eed23e8e90f28b9806e6d6fd8f134b29a09d860fa495e57f18681d48baa807c5f2b293daf75a
-
Filesize
95KB
MD55189e089fef755f6c662c82e225888e6
SHA154de97aa8fbe138af38eccce0caecc5926c0b53d
SHA256455413a4c3b55faf452e5854e002471f40c60056c4d106a8a144867546638538
SHA512e831ff5acb2efae74ce813aa37cce95e41e5ca9daf0514289d38c306e78d89dcf79be199295186be28db893bc7c987b065dcb378dd6cc53dd3924bacb8f9e121
-
Filesize
93KB
MD53091d948661e1475de3b72cf70292d45
SHA107eff979a5f5ca78770160bdcfbefee7fbb77b2b
SHA2569b205d04c188284ec213477e6c578587d120d85233238bf3f4fd479942f2b7db
SHA5128a6d80e42aed88d593ec88e9f1cf3859d8da088fe3c390fd06ced61412b8d67e1823018e6d47a36ad4d9073875f22aced775a0a8bfe98c69e2ee9b9b000bfffa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize8KB
MD5cd1aed64c550c1673f8c789bfe1a3268
SHA183f4b22292dc5f8d8080be4922bfb67af2de9962
SHA256a07d7e61267aee4d3e64a0f3771eb3c04bcc6e19453ee83a98250d8d8672c151
SHA512c5e5a8dcea617c0cd0faae6ba0ccec1961f4b0edfc8104e49f716d5d339eb8def00716f356d52523afce8c5430c0e64509f32fab16f559e3c2c07202725e1ab4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize10KB
MD58cbc2c78696456e08270ccd4baaa3227
SHA1f7832bcf1a8d55ac890828218116bcef081b8e0c
SHA2569a6deb4143c35ad4cef3a88144842adaaa5445d40ae61bafd2b5a3892106f0a6
SHA5123024e46f27d3355a3bea7a1264933a9d6dd730119264d63d4809827529c8337afdd8141edbe30d443c61d6b01f3f02cd2a61dbab6a4b5e5491b67ee117e8277e