Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 14:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://search.x6b4l.com/p/v
Resource
win10v2004-20240802-en
General
-
Target
http://search.x6b4l.com/p/v
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133700215144801867" chrome.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 856 msedge.exe 856 msedge.exe 2564 msedge.exe 2564 msedge.exe 4392 identity_helper.exe 4392 identity_helper.exe 224 chrome.exe 224 chrome.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe Token: SeShutdownPrivilege 224 chrome.exe Token: SeCreatePagefilePrivilege 224 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe 224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2564 wrote to memory of 3800 2564 msedge.exe 84 PID 2564 wrote to memory of 3800 2564 msedge.exe 84 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 4548 2564 msedge.exe 85 PID 2564 wrote to memory of 856 2564 msedge.exe 86 PID 2564 wrote to memory of 856 2564 msedge.exe 86 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87 PID 2564 wrote to memory of 1060 2564 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://search.x6b4l.com/p/v1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff07c146f8,0x7fff07c14708,0x7fff07c147182⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,12271442505988124081,3490676160976356551,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:824
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffef539cc40,0x7ffef539cc4c,0x7ffef539cc582⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1952,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2068 /prefetch:32⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1840,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:5184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:5376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4768,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4828,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:5872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5156,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:6084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4844,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3444,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:5644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=240,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:5996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5696,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5408,i,11102125288956926052,6397965115439756502,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD563346e1e0058f4972a59731c458fce29
SHA12e2d32f0430a198787b62d41987cb09364db1f3e
SHA2568ac7ad968f027d9553e2ccf29b8ad6132d6d00942aa2ef3d75eeba29c3f7e116
SHA512535e5f44218232e0011e7254073b5142834dc9925161b4920337e22a47e04e4a4462e15cdcd9671700bdfddba5de8c4d49b6a983acab485a6a595760756eea53
-
Filesize
1KB
MD5d3a428b3263edc3397ea46513d59d176
SHA1f1e41a2d0f9d9c25ea0db285449c2e164b2ecd72
SHA256eb1eefa0ec267e9d499000288ca39ef80956dbe1c1bd7f16f96e274675486b8e
SHA51287ca28acfee8d93f118c89746ab144d94fb13e031658dc2c11a434cf43dae03311eb9c44484c1ff8f4905313d1b9a8fa5e72918bfe385cb379761cfbcf7e7ec8
-
Filesize
1KB
MD5b6b0154f3523f7ebbb3bed1fe1233e1a
SHA11210f5c797e86ecf6f1c703932ae92c3f1bacc8f
SHA2565d813e1b5498ae17e02bb466d8ea90b3d5b271a5ac71e7d1d3779b854dfb6b48
SHA512e507d5983f3edab2c8417edfda1a91290fb1587ec3a57534f9bb451f9c791b886e6605a7d61f7d86b527496b961ffbf5a19f1f5f15f677425ede5a102d6e61da
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5866995d7ba3802d4cea81f40eccb0b45
SHA1c9029e52d36580b7f495c352f5868e08fc3749fa
SHA2561e786890e41bd1dd3d579275a8f5022cfd2ce1d5f95663803d2d9e0a64936898
SHA512a66233b6c5f912f7e815323dec269e471d7c6a801bad446622c3bbc5c85a991ee4b0b0cab0319630ce195a005126a51615f5d9e27db4184ef9bfab3d54865df8
-
Filesize
12KB
MD52fe0117e1c0c23f9d63a3748854d3cd2
SHA14c0871623c2b7b18ee1d2ac4c31bde5a14606c6b
SHA2566329647328a4690c868c361b3f3c27179441994fd9a5202b107feb2ced6ab282
SHA512f0e48d39fdc5378c11cf60730a6816cdb320ca5d369e02417aa2d54500c0fe9aa9d58a191a4b05eca29e2a6d52f064d3df0116e40b480a67ddab8eb9ff0ca450
-
Filesize
12KB
MD5572a939d824e12835bb2caa6896c008f
SHA1c0ba9250befd0b76ddcb7f94423dbdda3a43c4df
SHA256b7b13135f5a8ac0bb009ff9cc82d43a9b4c2b44ba5c05326bf52aa50889f1c0c
SHA51275277c53ae3383ee79a4e73c59502e2ba6e0b98b13cd6bd1b34b8e6c454c63b1d25a95ed4545ad348376f432598d8644e9fbdd91ff013d60ebf59615c031842c
-
Filesize
12KB
MD51222c70a63661eeeff23046c40d7f539
SHA1f73ce0a38c3d66726a850c977057eb888b4b4fbd
SHA2565ede611b58b326b4d2a258dff9f9b09062676ef3289693642ad6bcded8039d32
SHA51220e6cefa6fab5e336f9958dcde9128cf3daf615407d11816457ad9e1a50866a35bdc12d77318a8bde3b3ee91622c2e02aa7119bba7a10a402b54f3a7a0591133
-
Filesize
9KB
MD569602dbd706f4c4f423dddc245052e20
SHA169d62b963ab598d24f157b2a15890c78f091109e
SHA256bbdaa1e7507b68827d245270f17d4cdca6b58a11ab2992794497ccabec6be05f
SHA5125d61ad2ee7b4498a81d059c6c6f703fd03179f367b51e608b752148a9afc6a6ca37469fb0c9053feaa1c88b39aed8365e06d4cb2bfc32991584ee7757d6c1a2a
-
Filesize
9KB
MD5b0b7361f486bfdc0f25dc39a03aed3b5
SHA197b8bf006d6f8f2a9042073049f1f64a42b13346
SHA256343e2f4287be2457651827f976262d144ca27f16ba1329d15907d6a6bc2f8f4a
SHA512ed8d537d806b7a38ebdce7290b568dc7ed579eb8b00d3b34acada8ec2f4c06cfa02705dadf9863c2f8fc2a0cd38b17bc577127085acaa763001c81a9e123fd59
-
Filesize
15KB
MD57e02f9ac60eff960b7971e42b03c8725
SHA1c128befc8249a907baa94017244e82b096fd9012
SHA2563bb5329243e4b74863eb8596aa2b7aaf6c654d4309333cb55956aace16bde882
SHA512f7ec1fb086486677d9c161baebb4d878569dc293f60eca5dda54ff0d6245bc50a94bb610883e4d82a86d1c627c52a3fcb9f75ca98441ef8866d02f18e05ed1dd
-
Filesize
205KB
MD5099184b32806fdb8b93aa3eb5cac7dfb
SHA106a09c480faa0fbffefd5d1ca6e78ef5de7c2b7e
SHA256b3f7771ecbe53dc7e8ef5335064e2c3bacf01b967b6d7459b9ec26f0894b2f31
SHA5126bbea81e68ada3dd56d8371f2085c37bf8bbcc9c8402ea9675bbee9e7a31289d38fa52f76861497a72013fafb4de4c9133fa4c12200f9ce8c6fb90012de51e82
-
Filesize
205KB
MD555b08c11de1d29f5044635ac2f185c56
SHA199d9781b7e8afdb73fdf653a3cdd3f966c22da32
SHA256ad22fbb33910d64e1edebde9c4cd8206e24d23038a6eea7e12c60516ccb59885
SHA512c5feef618ca2c7e78978e180c4f25902b1655d7d9b1a4b6a74f027dfb4e2faeb563d33e898125e7fcdc869861036678feec7fa8474ab57ab4911f31e8876aa53
-
Filesize
205KB
MD5d3f85ee7d213ca9bb237e960a582127e
SHA1132a300463298f4cfd59dd5562bfecf1995ffd15
SHA256197b7264202456539a38e3d58e0810ee3547d8ab5d7f982c70640d0f92557030
SHA512f07dcfd7c96db64fbb5fc8d93a3e151351d898e733e0f02b772c6eedbbc8563cd499850c91fe69352c2b5e36fedd4d3460cf7bd490d6e9cffb6d0e3493cd7aa4
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5a589dce259651dcaa6a2d25cad9cedd5
SHA16f711f18e1345d12f5eeab8f43a308dcf29dcf87
SHA256f125a6927128d0211a68e1fd7a22a78563c02bee67bda7dc4fa98a95a8bde80e
SHA512a1369925a7414ac8484ffdebf1bb0def5d532336809c26bc2d4f19e541618d02c968ea638ef1e462e7eeb717c07b7ab4d77f88341327a26326e9f1bd1f2f26b9
-
Filesize
6KB
MD5b64a274508818bc7844df00fda366ff3
SHA15554c59106001d03eb007dc57a04defb65621131
SHA256740dd3fb22940749a2871fa4082d93488f76b4a893fc4b467e7c8d2657a4f4e8
SHA51275904a9410b36055e61837bb92241d154a25e3109206b447f95f39f40d1d90ac5b426effa813c53b3d5272ac6fd361442c8371e97c29fe741ec728cc7237f13d
-
Filesize
5KB
MD577b599b20c948bb4b66d3ed5ad9c0f42
SHA11994279cadad3e5df4115649dd46d6746f3e114b
SHA256c18c1e7703b8070f9fbb56096c3d270c98b4434ccf952736b48ce2b944f84ac0
SHA512682396d6faade2867ed5eb673dcd5b75d4fa93209f7e434f30372c5066ed4a90b1eb7e954ff2946061b2599da88c14e60e8f117b79545065557dbaf296e423fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52ed8ba1924b3745831169b852286db9f
SHA144d17df339b142365b46110d3374452520c0ddfe
SHA25663624401b04ab713870bcaf19205221bac6236432799b6f63dffe64e3c19d0ee
SHA512250bac3a811a5fb7aeff92d3373315493c7ca32375c00b23861f20e5035206010fba985413ecc9520a1835ed8e558334e5efea45cb56e07c1c8b8e0a9f502c61
-
Filesize
10KB
MD584e1960d5568364a04ce202523c79eaa
SHA19f8618b7d48ef245c714f728bdf0912c39e4c881
SHA256a77f75e65823983b54bbf1020728e2e28c2788b89338a50585959014383402d7
SHA5122041b87bbb6d615d70f1a9b3f08430e5ae2fc7d4e4a4ba1652a46b61ed1e579a8e27e040495e1f0d35883ab12c4c99956ec52fa76119c7900ea65082b5ee6fb2