Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 23:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/url?q=https://www.goo
Resource
win10v2004-20240802-en
General
-
Target
https://www.google.com/url?q=https://www.goo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705724051482924" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe 2336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 40 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 2236 4704 chrome.exe 83 PID 4704 wrote to memory of 2236 4704 chrome.exe 83 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 3552 4704 chrome.exe 84 PID 4704 wrote to memory of 5032 4704 chrome.exe 85 PID 4704 wrote to memory of 5032 4704 chrome.exe 85 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86 PID 4704 wrote to memory of 4000 4704 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/url?q=https://www.goo1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb61a5cc40,0x7ffb61a5cc4c,0x7ffb61a5cc582⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4404,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3688,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5064,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4928,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3180,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5384,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5432,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5552,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5824,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5964,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5572,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3196,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=6356,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6380 /prefetch:12⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6336,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6420 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6160,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6524 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6688,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6672 /prefetch:12⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6836,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6852 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6808,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6980 /prefetch:12⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6828,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7116 /prefetch:12⤵PID:5156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=7332,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7288 /prefetch:12⤵PID:5256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=5992,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6360 /prefetch:12⤵PID:5584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=7016,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7112 /prefetch:12⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6412,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6436 /prefetch:82⤵PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=8080,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6488 /prefetch:12⤵PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=8100,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=8056 /prefetch:12⤵PID:6116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=8128,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7132 /prefetch:12⤵PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=8160,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6884 /prefetch:12⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=6732,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6708 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=6560,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=8140 /prefetch:12⤵PID:5412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=7832,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7752 /prefetch:12⤵PID:5444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=7836,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:5172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=7116,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=8024,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7984 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=6908,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7972 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --field-trial-handle=5364,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7904 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=7128,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=7176 /prefetch:12⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --field-trial-handle=7500,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:5716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --field-trial-handle=7960,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6684 /prefetch:12⤵PID:5880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --field-trial-handle=7576,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=724 /prefetch:12⤵PID:5888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=8112,i,9707150233834340561,1243760916497834431,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57b9d4a54275ee1199f35a3588c34f8d6
SHA1288b3a35813ccef64557d99b0706b7ebbc9cc3f8
SHA256c64ea0f7467e4d06a2e8562613b3e0d25ac6556b00426051898630a76678091e
SHA512d4db54f528b7215c28529f9832a8322a040e59d5f65255e9b8a6eeac7fe857cb7cd73da1e657ed0d07e8fccacadd4b6a9c31ec1a040c19504c8835f468236a5a
-
Filesize
1KB
MD59bfa6edb62c5150959206ad1aa230409
SHA1ff3c8256c995e0680e2926b3ad35d345dc124ce2
SHA256208fe3c73bac0953aa65fa26abecd6ee2355f20a97aa5d5019e18a0d05fecef6
SHA51299bf3311d02816576844a9a95a7ec5fe1285745460084089b4153a6b6e8b16d242f4ef3258d659a11fa46eaee465ea41cedbb64c67b7ba6fb83d177e51c83cfd
-
Filesize
17KB
MD57b484ddeec997e7105a2cbbc3a2bbe0d
SHA1c28fb0e3e4b078083e1e7d42be8ea33317513800
SHA2565b016e45566f0f906895b2caa5770e7cf2b7283522137bbd5587f51976f640c7
SHA5124a0fa5f3e810343c0c74ef05c1111166be4d1f2e5072bc0c0f4da28ff9b5c70264e9f1c3350cfe5d8438d7d6ac6a7170644a5ea3cd3500f98fa3ccc7a994186b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
4KB
MD5b67abfe1ed1dfa4d5bafb02c9dcf8011
SHA1b9578dbcfdef798ab5ec01f7051aa81af019b989
SHA2566f9303c65175083d50a5cbfcd28bd37af22e0e74293159ba44e7f234886a5b92
SHA512926a6b8369f17e5552415db7261e6f116b4d9a83bf693ec81d056d5b819913a1575c5c86ad1aa4dc475e743cd82295f56d4ca842a12752861f1d440213b95bb9
-
Filesize
4KB
MD5937fe086e2ab6bb203daf56882472ec9
SHA1593fbc686f81bc4da6e294b5931309a1ed706674
SHA2567a4dd5d48d7016f50a5e545a1d6b3ca469ac0829d6519e1405611343c3e05e4c
SHA51232da495a336462d4734a9e54f7524883ad7d3639554f3926c7351f15dd9f5a0a7188eb7346b651c430bb7bd0a0407ba7b478590cf5f6d9d8473f493dfd17238b
-
Filesize
356B
MD51d637a40c0f8863136148dd496f8a6ce
SHA1e83fd8ef561b46d57480ef678b1728d05e7f15f8
SHA256f3fed6e6b259605685b3f28c6510e435be27ba4e637e8d074a7126e5f8f825eb
SHA512ad88fe2992e46044adbe9a508d3c8f642c2396a4f129defa648c43412b811157e2e946914cd51098de48efbc8de261013218f90efbe8992134c53f8d09145755
-
Filesize
2KB
MD5eb20e4314eadc7a5955edd0abee8c538
SHA1a78200af6c5a71c86ebe2260d1f3fc5b0c5441a0
SHA256f403543d242cffa28979a08cdaf07a2500e45bfff1d579f7cba93b967acb0b38
SHA5129d6efbca33609bdead3ab76e26ea329a882f536f394e24fdd7220e5a75eec14306e41d4aa15bd3f0bbf46a66e78fa9f93a802f284fafd7a9de234df065ad5f8a
-
Filesize
4KB
MD55b069f198e0f1ae36825ba17482f5069
SHA1999aa94491a6c4fcdb095f3e93d2bddbc3f6014d
SHA25620fb6be1f93ad491575108f4dcb744c228d52a7967caf2463f0c1b7050edfae3
SHA512e67e05380a18bd0ff2f0d809fe96c29ea9638b7b7ba59405504651c2063d9a20aa30cdf559f1e19c37460bf51b295b624466500e86409ec929bb731ad593b06b
-
Filesize
4KB
MD5d604f5cbdd116ac882493ede7c56c33f
SHA18e3a7cd34466ec10c0c7b7729ddfb48c64a034fd
SHA25643c37ff4c45022a109206b59652bc0baabe44baa26f6ad43721ef419ca374aaf
SHA512b3f0a26904585b44015ba98b84bc0221ae441605eb0f2771a5ef00123aa289a9ae80837511eff919ea8ea3a4cbdb4f7e0069e21c45f1be732048796afd83320e
-
Filesize
4KB
MD5840eb16bdfb9500e0c9870988904b7cd
SHA1026475d5665945e9e374724508df2f91d7817640
SHA256db9640261bd0cb04d3aaab041fbf7bd2159abe564bb333e0965fb1c3f699682b
SHA5123911a1273f6b2228a4f31ed4256c78dc8db17a24a98991371184930f1a323ab1e78ce6de5fec4ac299d1adf5e93ffcd3efebf47acf8c6f2651ca3ae792c9cf30
-
Filesize
10KB
MD5c238c637f3bf710f42b8dcea05cdd0c7
SHA1d29e821f86a6886fb0f7f7e675820458d2fea617
SHA256f80ba786872882d00e6d3caf9cd1d963697db93efdff9a04062231f058f5183c
SHA512e08f94faab5f30ed4fb4384dfdae58a3daaa5388ef3544260305e57009095d063b75cb30f6fa931edb3912a30cb9eff34b7f332dcdb7bb54015f5340a58924c7
-
Filesize
9KB
MD50746f72cf6003d3e170a92e7ceb87b13
SHA1a9f9a1faac478a23a76709c3ea55422cda72fbb8
SHA256437f206eeb0f580508d03f27cdf9613272aff10ca2847eb57ab145d8c03f97d4
SHA5123ef501b0b1b58374fab528511114be6e17c908cf42d4b9edd538206af2a6466492be9c3ef6ab87681b8f6690dfd1238ef77f5f75ac737046d910602aac6e3786
-
Filesize
9KB
MD591362523842f312a5dc8dd2ced1c29eb
SHA1ada21936caa08c133e8ad0b82e411a74d81c9de3
SHA256983e7449c7c06bc466ca56bcbdfa08f9b7451e248489094f82b39bb0be9977d1
SHA512b3d30e45edeea4f648429b5bc93707dd514129f575ef1ce902c15e75cb4c2b66b3d23afe212099abda2c9428905b96014f8e24545c8acc02dbe359ccd3133d46
-
Filesize
10KB
MD5678c32f6f6014a46fca38b83daf057fd
SHA1430171247a5fc253ee0b3a4603b9f91c2740e218
SHA256239dd726596fa0579c655cab7c30217f23dafc3a3540e537a8dd7cd3f76b1b1e
SHA512d2c90904773766daa9117f39b942b85a8a75377eb0604dd8d8eb15c249af41fc8e3c0ae4c7940cbbaad06313c6c1939232c4617ee85af8588587b4c7c53f86e3
-
Filesize
10KB
MD5b10a9b1ead4d42cf95482b79a163b4fa
SHA1ad9609c2e1b751a4dee0e759f9240da481ab00a4
SHA256861e2507f4129799ee3afbbb8b91f2ea0f65140b5a5274cea25bff838c97dcd9
SHA512dbfb6b131f9d32202b97c16c67a76ee536feada9e6de778fbd1dd34e6d4c4ef86a5fd3b19fade99844570eb197d7571cc4f1509f15c26e59d54e55d150ae37d7
-
Filesize
10KB
MD5c94f35c420ba0496f3cbd01b3fb5dd8d
SHA1e341ef5c3491f0d24942b0e724f5eabedc26d237
SHA25662e9f8b0663e989d24eef5243f934a967ad84481c8612ce9d49f515bc1f4d9b1
SHA512e2beebadc5ac5a866952cb749f57b45ae55c2d735f21e747304c7427ed72b1c5ba3351af0d5440e9377d9318c8d2b98efa63b10425830627425459edd4c5a898
-
Filesize
10KB
MD535f3d3530647c7e17153ecd4a740877d
SHA1dabd925b3dae4d14a824500442e1c7abe74c9c86
SHA256b3d71a60b8244dbcbe1ce7ecc369e04fb994234f30749775f1baf8a5506f4779
SHA512b826064fa847b50300905e126bcadc0253fa3f2d3bc16d14618a767b86ed892ac2c35b65f8d538adbe6db010b06a5ad7072eb29267f641fc9ad6817092dba705
-
Filesize
9KB
MD5b5f63ef29c1c2592af69d65a25a80d25
SHA1b47a93f7c280dfc333decce9a06c7d3fb189daaa
SHA256f35c829ddf2ac2d4c45be5d6c724b2b40fc2ab063e85718889efc52a976cfdd9
SHA5128239d20ce555f698e29c83cbbf4ee1511a39d9896140f235373291001c91216f92743845f1a2d68f24fe7a8f46300aed4e8f55c723338f6c116f66f1b097fbe7
-
Filesize
99KB
MD5575c34c19ec51ff5f563bd9b9ff260fb
SHA160f4761ae7fab69552792d2661ea2b8c8bd65366
SHA2561814bf4a0c581264d96bca14b118bb216d34efd9261470bc3fa00d4e1bce7e26
SHA5127372401706f1cbbfe46e7eb6539800deaa95df90cb7ab562fc69d3e368345f4ba623c5314ca4c56926ba3af461ecc27e2c3bb532ee0a6006ab55578180648c36
-
Filesize
99KB
MD5bd3f685bbc4cc70c1da6c9d143fba8d7
SHA15ab9beaf568b377be907f9a22beb4db641de082c
SHA256a78306206fbb1adcb328b730430cee8ac886729a85319914d718cc680cda226a
SHA51208eccb750b4a9bed55f99e27793a75e87159ff2e7b048e3d44126d4598b23b84603a79553a946c34dc7be31a35c56b26196b354f6cf59a3f8e1578259eb9c9be