Analysis
-
max time kernel
265s -
max time network
261s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-12-2024 18:08
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133778957213284577" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-556537508-2730415644-482548075-1000\{9CB26992-02EE-4954-BA9D-E952F3EE3A97} chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe Token: SeShutdownPrivilege 4976 chrome.exe Token: SeCreatePagefilePrivilege 4976 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe 4976 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2360 4976 chrome.exe 78 PID 4976 wrote to memory of 2360 4976 chrome.exe 78 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 3508 4976 chrome.exe 79 PID 4976 wrote to memory of 1200 4976 chrome.exe 80 PID 4976 wrote to memory of 1200 4976 chrome.exe 80 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81 PID 4976 wrote to memory of 3324 4976 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://youtube.com1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0e07cc40,0x7ffe0e07cc4c,0x7ffe0e07cc582⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1792,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1788 /prefetch:22⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2072 /prefetch:32⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2132 /prefetch:82⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2992,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3008 /prefetch:12⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3004,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3036 /prefetch:12⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=2980,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4412 /prefetch:12⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3152,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=2968,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3016 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4708,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3108,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4248,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3228,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4664,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4736,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5316,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4968,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3236,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5392,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5456,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4908,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5520,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2116 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5540,i,7920058569631958192,12111753486909249610,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Modifies registry class
PID:4288
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD51e9ebdfc3d55b515ba9171cd0b56148b
SHA1389b7d2fdfa1fab9f808dbf682d38acbcb49106f
SHA256a0b0b4acb2ffc88000add7f6157121f4203f9ea50a9c4e8396c5a9c1e1f8c511
SHA5126d7cfedb3c629f55b1fff2fb32a69eb1eee892afa2cb533f9854a7f3846250a0e37cb93fb9a8f2e9a148c61be67d4fbedeb3a4f2cf358d3197b8ffe2527b5f91
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
456B
MD550a62bec713274a1b3eb0b0544570ccf
SHA1615169aada8a5c9681440d2f3447535665ae56e6
SHA2562b31825e45b4ee3fbcd2cfb826a2dafcb2a00042042326a45a4b641d235fd609
SHA512b8aab9992d37c809ecf1bce11ff4b24c898eff9a27b83999f78fe9276a27eb4f552f5ba94424faca0000f7338e4a907b87e10ff5879a3901254bc740709f8e97
-
Filesize
1KB
MD52d2ceca648c923b8cfeaf97021f56e3c
SHA1dde4f47a19a15d3e050c676d25914d270d55eb19
SHA2565aa4ed123f381d407ed6311a20392d5702bd6d5d2dc7dcdb3908b200a0f64ea6
SHA512aebaaa91f9e50eaba9a74c7473ede2601546afb690dc303bb0c55ba3c2b41c6a784b9595cbfed105a5502304a944bb678f916d1518c1ab7133b7a45d6c6dc746
-
Filesize
1KB
MD582847a8acb55f4a6819a2bdd960413f8
SHA1bc36a40def50ae6221ddf3c5191a9deceb7abfc7
SHA256a0379f24c790e5049d31e1d1a0cb222079714287f12f38edcd7fb719d6843175
SHA5124b300b44a0acbdd2ffddcdca920b71a208d6dda502488dfc8e3476e533a562e7852a5765b18ec31dd1bb8b3f4f4ad2a4ba57ced22027981b504de0d3a9c5a3f0
-
Filesize
9KB
MD52a2c1c35b4c4504d8b0601541eed84de
SHA19d992e750fdabb11d4b38ea8c5ad9ab1c8e359dd
SHA25620e5b8eff1e0c0facf2071bbb3f7887e94c8ff110ce0e57b4d749c4cda248270
SHA512100010f5b1a065985de30db68c68a8a12baca1e684c6c920d9eeb3df95327dd12615bb0733fd1fcb91ecbe3ed1ac3b1e5c03af394f404773499bca971fd23fa4
-
Filesize
4KB
MD5dfbce1c97ce7c994894019212447e6d6
SHA1e1aa88301dbf7ae09765de9651e33c914075cd76
SHA256e01bd09983218e3ae9f09bab555fc737c2e2b70b962e7e44a96c0623a1285c35
SHA512c84551e34ab21aa785f5fc310a130619976ca425e90a6398bb88cd8e6ea9caf62cb30da7ccd121dc2053975295d713932c00dde021afa9a63e0e7753087442b3
-
Filesize
9KB
MD594a14ba13e4e711f9b83d1496c842d4e
SHA1c849b6a3b92857f1fa45218ba687d3695245a2e2
SHA256e574634b7d77c69af0093246cb6bef552f3d915689c8ddc11a4a800b1389b173
SHA5124d93b8a9178e25bf5c00c5f75ec64a2e76a7b743f36f8fd23fe8c1d19df501b81660aaf2129cd51cf8c0a218c24df6d3d337bacea739b9afb9b4d4c7ba4b30d8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5bfd4051863dbeff030a99684a58e3318
SHA15153c9a39f93cad0a30c9e918f3549959b9c4baf
SHA256f1d6964e54cbdc6fa12b268b376f0ff253e1f34e95f6c68f6efd393257f768aa
SHA512ca1f16a6c9c74359ceba45e4ed3bd9dea078aa46cd6d74d2e682cce4f3013e7d5992d06027bbc02bc61a6f1419e0d9324e5a94cc961fc83274e62577e89372cb
-
Filesize
2KB
MD5fd041cbd81b467c5a072782ea879fa7e
SHA1874cbf9ac1b5c6cfaedb2ab13dc6e6b18678d9d9
SHA256928d292eb29763f5792e5d5e89f2d97b69c1b6d71f67aa0df3849bd1400739f9
SHA51233605194dce4f39bc697a2ff34630022366d10d6ea924b52768fe24bc1cacfa791ddee6efc732ac6cef33821423de457d862b4be875e108b8642e86b1fa8a3fd
-
Filesize
859B
MD5b638b47820319cc7f437a2aa31485df2
SHA17d61d935c1a1e3b0baab0b76c2e0dd7664a26b4a
SHA2561952736f5291440d2f02900668aec42c6d54b69eaa982bb8e47e15e8713503ed
SHA51281dc0e1adc0e830a516e89cda3244a7e480862901f01fe3cb4c7a2286d6d575cb6da15ca694fbb9b6cf8b656ea663dfba578c0f586ebc3e8cce3f2f3050d2d3d
-
Filesize
2KB
MD5bbc94b270143fa57150cd682e8279ff4
SHA1a2c93775cc96315b1a822d805a653ae9bd901e19
SHA2564c7e54fb8d95123de29328599794cfaafc4473d548a83c565d0d084293b0b0e8
SHA512acfede60f5af1c98f0ee0062c258fa717208735492ca02dfcb3c76370d3e2f4164bdd558f8402f4a281be02ba7a59b882e6bf0809541337946bad5c80b0a69b4
-
Filesize
2KB
MD50848cee974c8fa41f51564dc140992b3
SHA1c87c33583f459b40cb3f1db5e6f9f2c53212f71f
SHA25639e502d6601f357fdb6cb8ff90e2afc3ff38e60ffc5690b3f5e9bccb4645072a
SHA512ca2077565fba57038b174e11e927b0dac1f4386c98f1beeb10c86b4a2e6d139c618c96609d331036c8d0dae07d4d78b46bc5a044e85b81e7124e17db7e399561
-
Filesize
859B
MD5b948ae0fd35d468d443adec4df8526c8
SHA1cc0fb93681b62468ff5d26b329bd8597a9131e32
SHA2565fe873e19656d6862f96e256322d151f4f5417ccdf82afa77fc5b1763d7efde7
SHA5121ec6bdde2114cfe9b685e40f6040cf7edb1c50b3871c341feacf4dc5a16b6f0a4a5409d4d8ed8f54d15bf4ffaa1e3aa737a478902a0c025af20933d2159bfffa
-
Filesize
1KB
MD563b0cc9e34e26633d7836cd3ac41bcc1
SHA1526eb3a8e56a745c9a969b7419dd5fdd745fb4c6
SHA256c10656af1f7983b09ead9954ba821430003cbc8fccaabe23033ad0f6457c15ff
SHA5123b8ea134ae0483a02b182ebae08cc0d84b1af058b09f2dfdc96e908ac8e0accf9d45cc78f10031bf607fb4295cf2d561eb4442c6c5e6a4ea4e247971de26c065
-
Filesize
2KB
MD5de0c24b03ff69f9a0e2db856179e668e
SHA1f414af625ccbdb03513040da97bcecd72cf09289
SHA25658fcb52f86ae24bf05e635a4e8de31bfdfafde94edd7374c453de9cce999f929
SHA512b8c85662b363bd33d6e39eb09c3a5388cb6189d41b8a1e89e44babb2f5bda2baddf1382d80b3350528cc5d509a878407591140db505caea04aaaf6802a648d45
-
Filesize
12KB
MD5e74e0084343409dbf00d59dd6b6e30ec
SHA174628efcd14419e3e25c20c80a7103696168099f
SHA2562fd07394a4cd2eab28c3ae4e186c2dab4fd913f0be2946cadbf71b5943136159
SHA5128425c697eb2d485c1832f3c7d4e711cf012cdf47edb9c95f9c432d0e906988fe8e8562119b47ce6c15a687ad6e9835dd1c7a96fb98363541c3fae2f2d22be33e
-
Filesize
11KB
MD5b01c5c6de4a20b7b37b611453b8327ec
SHA1a3289286dbb272939167db37e6034dc38fa53d5e
SHA256d5718f29a8c56a6864847fb45934039fbb930ee8fbd09a5b6a573deccbb1f185
SHA51248e94ee43ce762fae120cdc9050de4d5552fa2f41518f1ba3c1934448c67bdaa11e2d76fd92718846f3ca51bc3db533345e3650d760a28765f68595288dd2b0a
-
Filesize
10KB
MD548a71c971b67b9bb28a5eef9b1ec5c8e
SHA1e4a34c7e2693d43875341eccca8ed68ab27d96e0
SHA25609321ef670bbe00b4bcbd9021887858c0a6b65b699d3aaf0949f8867631ee3af
SHA512fbf937c1b04e22ad2a266c7e0635aafd42f14a6b9ef76a41ff7380d3a022ad43db3cda66543a44ba9c49f651cfeebce52ff346e9d3f802fe946212fa7301e1ba
-
Filesize
10KB
MD5308850d905ba15dd2010bd197ea13dac
SHA13106a5eee5527bbf9e73fd493fa0d353623b6505
SHA25650804f42b4df19700bc16964fb142b1d9077f4a5648ea0560469fde60767f69b
SHA51207807d1cd09d946394f2c0dde17ae1fff8547ffc8d42f8bcb2f442c39a14e5b821be1b7d83406853cc4f4112e1fc47ea252ae6daf86a0be40e101921b73abee7
-
Filesize
12KB
MD51e6725d7cb939a420997fc7aac0a67e8
SHA1392f4dc1032214fe61b604a1e1a010a6f2b63a7d
SHA2564042b0a4052ebe213b701ce00a562d22e862ebaedbb68a329d2e659b7b95a5c3
SHA512671aecbf36e257cbc3d2e7f7d3bf9d1d5fdd0f1ebfcefc0c07bc5bfc982009448578d4db9818c75e6bec928b55e35edf598ac0557a460075c8c4501da9326317
-
Filesize
12KB
MD55f5782629162eaf75396385e9eda0123
SHA186b9d63ee30fc99100e586f5853704ee501901f7
SHA256b5c8957181aa89781f29d69b9699e148589b10f693ab825b92663fc06577e7b1
SHA512de7bf39ed70bd1e932f404178881c5ba1e1f1445cf77fcdad5ce5edc87bb7e865d3fe7df85fb00dc4a0d33e2cfbfb96ce0909c79174bc651df464b1b00d8c9b7
-
Filesize
12KB
MD5567d1d6b587031c8d040289161f1c5cb
SHA17665270f37a9b09cc9b9aa78bb1d860d169b0450
SHA256cb2725b04c58ee1927450ddacb8b23487f5e9d67cd3b5e87d8fd085c2397e341
SHA512eb18b654da166ad0d7d5c3af9866e4281bb75b7ed16866ab060050bcb296519ad852e065855331d300b8adfb5b3e91076790989afdad4b5127f1b774aa7471b2
-
Filesize
12KB
MD5671d617393f542dc8644b6871b0b85e9
SHA13340098906a0e64e9da57f1f13e7f6649f52ce71
SHA256d29ffe107548da25f5e7b2b34501d7dca1d33ec71200b27e9f777f5843894e76
SHA5128a44f527ea9c396bb2f92da1f112c1eaf01cf2f236c08a07a335e8991dcb14a5abcc824095c82e41e0db5c85a63ab5f81b4f12ddf463015e8f36ba212e0d0dd0
-
Filesize
12KB
MD51b1ec212c310b53ef71b9fcdb36203f2
SHA1c7323fd1af45c7b7ba3be3bc4d80f46b7fde6ab7
SHA2562dce53d2cf6492c60172e40e7784c3bfa134dfa79153a8f15ffeb5ecf9da40e2
SHA512ae57afc6cbb30c8abea4730af1be441fdd910080e2f19a3b52af7b39751a5ebd7ef97634709ff2a65cf4c2d333bb7636c3e2307802a3b97882d99d340653645d
-
Filesize
12KB
MD53df4d24c503a50bce19982ba142efabd
SHA131541530ae4ba557463f1d0df6551013cb3a193c
SHA256cf0a886cf99d649aac1e25dcbfc81922f43cfcede204f33b4d349e2f7d78eeb9
SHA512fb780c89b0f74beec9c3102ddd9d8b11f91754585d80ae9c66f2427d5e5ecd7ff6d588c547e3e8e1dcd0bd729a561e7fdbd8bc37efb3417bf6695a5fa98ed188
-
Filesize
12KB
MD55001dbd233a6100200089bbd4c0d39ef
SHA1c9798dc48fa08aee682c5c472dbcd46aa42ab0b6
SHA2568e0249c460a44f757cbc1474ca09a1dcf8cc73d5cdc53ede7544fd3540839d9a
SHA5122c9458d0a4f52cfcf4f3f0c4e07c7c1aa4105d6b652fe5b505b39ac3336636a722c010b5a3cc888c52d5bbf72b2af5161543353af52ec3211253ab12e7c02eac
-
Filesize
11KB
MD50d24e831ebe32822b11c752ae07c086c
SHA1ac2ae4b1126991d5415a0f198d81911ea40df967
SHA256dd52176b072c04682728e92f663a99c0c08541d01d5fc5fb881ee42a78c5ef52
SHA5122afa5de2ad09fd35c1dea89bcd4a28f8dd22e98936c1cd6678a8975f6dfb808a34f151c63b12f4b5b070cb23082b8ac4665abc28e68edadf276638774ea63a07
-
Filesize
10KB
MD54e15d4c88275608718b7bfa13a5fe748
SHA1425724d014e72d97dee217fd6541275b89c5515a
SHA256ff3d8c27f86c756b7d5d15ee1f001bb5347cc33951f1b2437f49626474cbd6aa
SHA51268954fa2609cc642638a0fee17525068126fc31a72f20b956f2f5076914924a9bb3cbe9aa65c4a40354ffc595e3931f2b2978a0238fe95c52d3fc8a8f4813b6a
-
Filesize
11KB
MD5e494ffca380b71f171f2bd2d46e56b43
SHA1feb48a1a064badda7138791c92f60e8f323d90f0
SHA2562e8d6b6ec132250f541638b2b34fda9833f47c15ecaedfa5697552c2cf0cf86c
SHA51263a3c9dc885af6833529261fba9037224d765cc2c9fcbad6a0521f6d1a0eb8010c446f2ca40d83d6e00a7c450fccd59c32238d81f36dd5708e8467ac66fe7d9e
-
Filesize
10KB
MD541d0c57fa75c3c32fea733ed40f4d5c7
SHA1ebacfe95566e1520e813cc5f25d5800437e2ff22
SHA2564ff7b889b12b6ab8423fb3fabdde02437302a065399378dca16839ae5471120c
SHA512195d86716b56802cf6f81ca0dafa60375d2b56bf72bfedab045d91446ef6c14add666624a1b104d1821a034103b61562d7151f0f08121f3230ae0c1d710c26fd
-
Filesize
11KB
MD50968df83a6bf29b0160d7f3a7dc1ed3a
SHA173897ba6ba2923851f1e55e120a62c1aff674ce3
SHA256ca63ffd7c450ee3a1e7860f287efaf2ee5dc0b773a8cc2609b728b41c87afcb4
SHA51247fd67e1c8febcd8e93a817217f81ca9b04d2243f8df78eb6c38f020f502f4da643ab3f8ac813e00308bc69bf5a0efe88d17cf95aa982a37d5f960dbb154026c
-
Filesize
11KB
MD57bd64e264fb48f964a3696519f02c281
SHA1f567c5d37851f12aa0c697eb89e5de2ef1ef7641
SHA25699ae0a6a0ba05f6fd912d92ab05cdc2db9dbc460c59841a579841bf9b1c254ab
SHA51289c93193e498f7c9774d41dffd6d72865c1531845e4f5ee16138f0bd62b9991c4a2d669a6539929820aabceef8655123f788827bb36d342eea5311380b409093
-
Filesize
228KB
MD500713deaf2a7522714f4cab8e12fb0d5
SHA126a0f881eaa950b1d683b2bbf990565eac9bb0e1
SHA2560930d2181c4f717f26954a4ccce4b3b81d731bd4ecc0abe4f7c577794a229cfd
SHA5129b9055e7aa193dbc023de6567e8d23abc43d6d0015fce52b0843528554345c43bac33d49ce97d185392bdd5f80946b1bf1da97e0e6cde0972a2058a6823494f3
-
Filesize
228KB
MD56a64690ed8a68157c3de2fb660ca0784
SHA121c1abe7f6249e3490b80eadb7c8ecef892e9b81
SHA256b4b26f0169be83eb69f99b6abdf5934320d0486b3875ac82165f97d57c4f7d17
SHA512ea27e215e0373ff9859da5807b2173377f10346bd5b9c996581559c8ac22af3073b51870c666be3fc8c9a7d974a4650702adf365226636d7500f8655aed6fbc5