Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/01/2025, 14:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://eproworldscup.com
Resource
win11-20241007-en
General
-
Target
http://eproworldscup.com
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133809063982617536" chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3468 osk.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: 33 1812 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1812 AUDIODG.EXE Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe Token: SeShutdownPrivilege 5100 chrome.exe Token: SeCreatePagefilePrivilege 5100 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3468 osk.exe 3468 osk.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 3468 osk.exe 3468 osk.exe 3468 osk.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe 5100 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 556 5100 chrome.exe 77 PID 5100 wrote to memory of 556 5100 chrome.exe 77 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 1680 5100 chrome.exe 78 PID 5100 wrote to memory of 3580 5100 chrome.exe 79 PID 5100 wrote to memory of 3580 5100 chrome.exe 79 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80 PID 5100 wrote to memory of 1060 5100 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://eproworldscup.com1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff89561cc40,0x7ff89561cc4c,0x7ff89561cc582⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1800 /prefetch:22⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2336 /prefetch:82⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2992,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3024 /prefetch:12⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3020,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3516,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3536,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4648,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4792,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4392 /prefetch:12⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5136,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5172,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2600 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5384,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5616,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5612,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5636,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5476,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5832,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=6044,i,9690378972325007964,11404987611812690126,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3180
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3468
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:4120
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E0 0x00000000000004D01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD511d253b3a6f1f94b363fcb04e607acd2
SHA19917081d96e0d89a6c6997cc2d4aad6366ecfcbc
SHA25620152f2fc1ca7717b9b858435b3658ce0879f28944bf822210e5ac5e148cc7ff
SHA512101086c8c2805dcb8bb4e2a3c979574fea1cf0268859804c350f05a85945216de51bce90981a11d08c9a7043efee5130ede5c5a376cd86707dcc90c0e4f45334
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\3cdfe4ad-45f7-4471-9d45-b57bcd142137.tmp
Filesize649B
MD5e5af7a2c358a9b22a147176a61174b45
SHA1b8854ca13423a0de64a8a16a3fe49a065c5a4e83
SHA25656b0cfe3076544025558356fdf8491f9cb67828d244118919e85306886d2b280
SHA51256ee2bf2924c3ca4bf75bd2dd9200847aea25f891067cb937bdf96d0fd37408ed22cc5b0f12a99f58ab13ee55d8d432661bb0dfab7417aec636864c1710b1df9
-
Filesize
846KB
MD5b59f2308678c8a8c654c73427efd6138
SHA1902e06f5d946bbd8fac2782b0ace1d13e675a543
SHA25630f9f81d79ca7553e17ce86a486a64552a3013f0c18cb2165d5941744854f117
SHA512cccdba09f3ce09e16be8e929270d878f5d226b22013c0df74c609e8ed51e00dc94b1cd61ce8103f541fda80293e53fcd0bc4cf3ed950dbe900896f86c3b718c1
-
Filesize
1020KB
MD560959fb691144043d848e2fd6006b4ff
SHA17c33e363bbd021af33c472dfacc6a54cdce8ada4
SHA2564348557e6e2490540ef23548d33326eb18bd1d4457399e69aa7b5b2ead9839fc
SHA512811692443dc10566c8e346df0c937f0d58de5e1e4c8e73b66756196c23cbbde28d2588b1bb6db824de2b3ec2f984c31323cb15fdc35defc8cf2abde5b15a7c25
-
Filesize
121KB
MD52d64caa5ecbf5e42cbb766ca4d85e90e
SHA1147420abceb4a7fd7e486dddcfe68cda7ebb3a18
SHA256045b433f94502cfa873a39e72d616c73ec1b4c567b7ee0f847f442651683791f
SHA512c96556ec57dac504919e806c7df536c4f86892b8525739289b2f2dbbf475de883a4824069dbdd4bb1770dd484f321563a00892e6c79d48818a4b95406bf1af96
-
Filesize
119KB
MD557613e143ff3dae10f282e84a066de28
SHA188756cc8c6db645b5f20aa17b14feefb4411c25f
SHA25619b8db163bcc51732457efa40911b4a422f297ff3cd566467d87eab93cef0c14
SHA51294f045e71b9276944609ca69fc4b8704e4447f9b0fc2b80789cc012235895c50ef9ecb781a3ed901a0c989bed26caa37d4d4a9baffcce2cb19606dbb16a17176
-
Filesize
115KB
MD5ce6bda6643b662a41b9fb570bdf72f83
SHA187bcf1d2820b476aaeaea91dc7f6dbedd73c1cb8
SHA2560adf4d5edbc82d28879fdfaaf7274ba05162ff8cbbda816d69ed52f1dae547f6
SHA5128023da9f9619d34d4e5f7c819a96356485f73fddcb8adb452f3ceefa8c969c16ca78a8c8d02d8e7a213eb9c5bbe5c50745ba7602e0ee2fe36d2742fb3e979c86
-
Filesize
144B
MD5eb713e882b1a3138c11281bd259f8f70
SHA18eaf5f564b27b2f7a6b54f9d0e0e370f9232c61a
SHA2567d36fde97efab427cc58cb9a84dd892f9252e78a38312ceb1176cc4a625d15ce
SHA512829b2a4dc143bfa7a7cadcd900c4b1ae1da57447a1fbd3fc794210c638d9f286049565c00b40a5f4f9f73ece5eb598bb5ced04f83c5cc3d96d901e6c6be5c2e6
-
Filesize
144B
MD5dd7a8a9db124992c8b4bf69b9971c42b
SHA1261f787f63c7729b0528cadfc2b45a6851e2f03e
SHA256f1d6daa20a1843ec1991a93ca38a12ffe0d30a3aa76f8e28bed8995d007b596d
SHA51200b86071e79e3fb883da661e34ed9099f784c77ba362dc6b2420f40a12a5307296e99c5f39afcde8e353e8693148c03ea9f370416eb1619fe914d02167b4e6c5
-
Filesize
552B
MD51b1b52f8e2ce59d37c0cb4f01279da94
SHA1440a1a8184e260f5a2908c1a0b03ed72e36db88a
SHA2563c948735277a085d7a79dc928d016b9dcc5f7bf6cdebefe4330fc821556d6f63
SHA512f7f953f55b025865e6178519c5a131fd223ce9acf260eaafab1014ce7564afe0bff6ccca40e359a6c742f005cdd142fa76f18c5601818bcd4abcd960185e91d8
-
Filesize
600B
MD5cab8afe90634000f1f34deed0a172288
SHA160d4b7a5905119469b6bad24ffd8e6429cd20f10
SHA256a5087e491d0d348655113040efc1ca4bced6dc2a4a09c5516809d6add2abd600
SHA512d24e80497766b47d61af9b4c3ec0ea8d1cfd40dd10edc15126de36d05ef6d21a036a1ce214da1a16df1eee134d1d83c55554fd3e396f86ec2aebf94e74ed8893
-
Filesize
4KB
MD506b53091bd4208b842235e2b550d6685
SHA1012a493a52117786420df9f3b52ddc4d6757ff09
SHA25630efa688fc0002429e968bdf278544c9cbdaa79897221615479aa1b142771729
SHA5123a96d1dd45c5c9cec18ac665fa7257e4867912eae0c31b4e6a8e48e947990ed6a8e44d4f584f582d121e6ff08be3a68cbc8f28f9fe75edeb7ad5da7200e65211
-
Filesize
3KB
MD572bca941244f4520954758ee78ddef21
SHA1fc656d2edc130f5ba093ad2dd20a869d779e8586
SHA256d9bf8577a563403929b4bda35fc19a07354a5a51340268ae506ff6014b663663
SHA5122d86fe69211a6c94656d83aaa342938a1b91daf6c254e0a2d63a8872fe49d8bb1cd677daa1ff8e4f63e3728be28911123aaff5b1801e1dc17d147d2c90ab2a48
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5c534705a17589fb6eb0105bb2cd9f3f4
SHA12b46a217f0c539fa8dc8c03234214562d81c20f6
SHA2560fe32d690ca3e0ecf9565bc80e9d6a181a6515e09fa39b2a6940cb58941d58d4
SHA512d18030889b12c82280836e50252b92048265598b3995b73fe6fa141c72d90d34fe6ee3a8547a30a565312b0eeb8793650921ec9bdbf73e6765c52862e9b9955d
-
Filesize
690B
MD5df20afbc7f9b4b6214fe64363cb5f44e
SHA17e94cefdd7611c485afbf55085f76be6ec1ba81b
SHA2560d04f2acbad18b5e3062d151b9dc3cde037989eda00913d024e1c7ce9f310421
SHA51294f75d1d3df2f80bc44002d0e20ac4e803981f504d98456a1292fd11c1f54ae03dab88158940f80f3d951f99d114079bedf1f1942ef9759e9d269dcac1b21ec9
-
Filesize
690B
MD51ac2f71dd10e96bdc20a92aaff9582c4
SHA1c370b769c808db8ca5b93789c02b62c5f457f41a
SHA256f7739621964d8ef2aa857aa9459672738a4c01ef81a4019cb2a229d4bf868095
SHA5125aa859dc5b85f88bbabf37d772c7c3a459590c83b3e57e312f2af8f564f9a0757d4c6df3cf75377bc3e69aa538c83f4768bc8002872e51b72f80506b66ce77c6
-
Filesize
13KB
MD5056bc64c9405dfcc3a13f0929916c9b9
SHA124ae7233166962a06bbc6069e297759f843b7c3b
SHA256b1f35504d94c4746293b4a77db983d01c2f103fd1558d9cf549bc99268aad6cb
SHA512da72ee86e3c3c0cdcd380ca966a91c011527f1086d2e7ed0c807899e4b1268369ac16dbfc6d5d57533135c13be37df1a0b936af14965c0ecb84842c0170ec459
-
Filesize
13KB
MD50bd2d9965ebdd8afaeb06abc64462374
SHA1b4e710ef1f2764c21c66d36473683a2a60a8aa52
SHA25633cbeb3177747ab4177acbf607aac280f7c82be2fc9efc58de5880957b195c4d
SHA51220bb19456c03f5cb54cb7bad7108602d8bdfd68a21b708964a1cb95d77f491f1b63580328738d62b0579d3ec31804bc4b05aac0db54d8b5b779a8b19480d9986
-
Filesize
9KB
MD5e5f172bcce562615f17296799a84b0ff
SHA1509b375bf270635551768d6c03698030daef23ea
SHA256f465bb27206d086fce85081fa7016d1e870b64abaec33f373db5e5f0fd3cacc1
SHA512d64231b071d471991bbf25bde77f7ae755254804df5f1f20acd7348b96d5928a7ffba4749a34dab70190f7f494b979f75005be23c795343a1bd867543d1c474c
-
Filesize
9KB
MD544c02ce4a7ccf6b249ea37b20a72724b
SHA1e9efe7ecd0691e3e581c197f8ea6c3fdd01b127c
SHA256a0fa2aed39ee13a246a0c632c42d5433c49309acac851d48aba8077ae776b423
SHA5129efece54b75c30cc9e6839ca4c9732b1ffb6fc77de7f20d2a2c0314f478a321c4d3b8e5cd5a8909d97131fe686a7768f65264693579ce1eed46743014726cc4b
-
Filesize
9KB
MD55c388897e4723555933b223201642c31
SHA1e65a31f4eca26bbe29c9b44c17ab52b5123b8d46
SHA25667ba96ff534684699cdb650edeb0013787ce413e9302a18a41c72c5a843b1b1d
SHA512c11e023ef7c97d5911cb7b1f5b515ddf035661f939beca78f6a62a759da93f7e5c6ca7f76f663314534f9603c769996f67eebf89a9e0337befe1f0b14c0e9b63
-
Filesize
9KB
MD5b01f8fa30acb411798861a4d3bd19b9b
SHA193af4a87fbf33e2f32c3f0873b2923b40f317e7f
SHA2564ecac76eb6cccf8e62059c55a00a31254aaf703e651d07b5f3a816768431336a
SHA512beddc4dcda689e36e6ca4827a6adb15c4ae697bd509f50dd23140730c216b277247f5f34d55ff3e233caef9086b33cda40ddcfed9d25cd92ebd53bfb57e29763
-
Filesize
13KB
MD5c996856c5f768a9e6b93dc2965814b0b
SHA1e677fed5cf641cfde0cf239140f9a6265d839587
SHA2565a79fb0e6e31a2ed4c8adb4a5609dcb13c5db5e7aa1d82d2cf1b499f7c5d4d53
SHA512c89eb331b3686fad16c12cab1666544ea6be512f7c00ba0b12e3a85416fc5ae15d33051500b0634d611714ee70c9c29019bb5a42e23bae22f9949728e0de2d1d
-
Filesize
9KB
MD5fd5bfa6ebbd391db6ecb07d09a8566d1
SHA1fd479546b61b831fe6a396fff76f6e23d4df4e22
SHA25684b6c8e12b7b4e94c2fa316d6a6849491e3a8a45456f633af89da2de3d16c7c9
SHA5122ab141f98b04db2cf457d1da329d4e10fabc0c3359edbb2afbafb0cbeece5614c3a52d2a2e788c65ccbb445097a2134f341f04567a837dfe634b6807a361c680
-
Filesize
9KB
MD513bc5b172caeb2378cd5bef346ad7a06
SHA1f64b5a5284c8f1005243b67e39ae93b3ab9fd5ec
SHA25632d4d41e48dc63e4656dd5ea8187f3936c2db206ea9197f1662eca81b4cb13c2
SHA51262f5448534fd2dba26391ac07b82304a40c78909ad2bfef0d40a0245fb4f229b56dbb894a5f35a7853949398405a76c57c8b16ad963b3a1462b6087b70250c31
-
Filesize
9KB
MD56ad6f71a0c23dfbb23137cbb38635a45
SHA1587545574fdaaff2b9ec0ab77d507d105c761518
SHA256ff777ec52e6809c07e3c605fef56ebec3a008f10ccdf7eb5c5f98f915f4b5026
SHA5123895cad4065830bd55ead711a8472788571f6c23f18d71b4a21bb841ad4b7538351ca93bf9fb73fe25f9ef67e7f86ac8de7e837a0e384dadc0524456674300ea
-
Filesize
9KB
MD5e3b636f9ad336780ff8b36f85fd5a3c1
SHA1fcf369b81a16a80fb768c44e9741f9052bdc1dc5
SHA256ac9eb8a20099d442feedaa1698b49ec5451f8c08c1b74d7bc6e7776dc87fd1f1
SHA512aba30f680935ff2e16f33eda09ec1aa794826109cdb607d0f3891832d8d481ab7c269c2461bbfbca0b3a623aa33e2a1c90aceda98d662dffdddeb62eed536ad7
-
Filesize
13KB
MD516777f8534d70d423cc57efa35934702
SHA16740363e810e4e92e767901916dd602d4b7e2e80
SHA256e406a78d23225ed7d59bceeeb5ac6c341b13d2e038057db28d41789dc788abb5
SHA51211e2b15b4c44159a1e3c935fb796237ece057f9c512802ce86bdfb95e6d7231ded04ad98389badca67c0da0ef340b22b44b6a14fab43239d3c10fa605603654f
-
Filesize
9KB
MD5c3a5de1307a291b7e4f9899a15089fa8
SHA1103024fb865b5c93e6631d5149513e65724818bd
SHA2566782222bcd1b27fbd9002e6f6b96dccca4ff1bb7e5ae75261aee9141d77eee2d
SHA512dd0c6ed088a96402d022638971c7753fcf183c0affb4d485cc2f0237653aaed4810f796d5482bac96ad9e74a5babef87fb94994f850cb59dacd75750c90cede4
-
Filesize
9KB
MD5b18714dd489560842fe703566edea1d3
SHA1e65b75996c7e283e161caf5406730bbcbfe0b533
SHA256a846dbbd26c9af4bd5d5840e70cc95fd37f1c23bf6ddd4cdd7d9f5a3f1b3ccd7
SHA5126c03ac0699ac47b4e742d90e0c1d75b22640a17ec16fd1fd07553b2b48b58fe827fabe089633ae3395b07a45f3cbe26cc2940ea0bbbbd74d0388d248283f49be
-
Filesize
228KB
MD551f218643781503515cd53837efecd38
SHA1b1554b0ebfda1cc53ae181ea4d235a4137a2d2ad
SHA256c79889ef473a1a270a5038bf16b6987d3d3d989047450787b09b0a21da2e056d
SHA51253bf694a3bd9af41104990b2fb9a2aa4da301176216dbf52fe3332c757a770907bdb454b3c42bba19b526916b83197d0f91f3adf6f1d2e645e98463c283e23ed
-
Filesize
228KB
MD5ef911b1e2abe07b0725aafa811575454
SHA1c6de6874009262017cb56cb2e531e93f7e3b617a
SHA256afe4fe88af18bb4bc07bb280a2d2f47771e0276739e797c22e9c4039dde8d459
SHA512f79fd91f296bd8e7111affa5b6a268d0f0501b3383a2642ae52898cbe531a00bd47db2c9ba3b4a3efc4c09ce5c7418cb2b2a277db6afca7f0139a8677859b6e8
-
Filesize
228KB
MD53655ed8e52118cdd4e8c8ec8e3c88afa
SHA1b9f2c5f9342f5d5229880521372a3faf73c87ea3
SHA2563a14731d48a79186792b9bc252d2d4d40dc895c952253e1ef70349a8b3e6c438
SHA512a9c5ad2ed05889cbaa7b4e82054f5f869645bba1132ac5a8161c5442dc9c29a09e4cf3e37df70c75f712e1d1d87065c1952bebc69de50363224f32c89c0a058d
-
Filesize
228KB
MD5bba9b52cc6636ad18fa89a05339f78cb
SHA18907e77f5aa929d2eb50030c027da70b0c0139f1
SHA256387fc289f26834fe720e3058f810a671de4fdbdf99edeb21b24a07129ef40a4a
SHA512477b1b762339e60f038fff6f7bb78a31d54090c7f9830ed0d9a58885312076eaf66529d2544d454d5ae9a0ffd301a3a9962434adc84c743fe2006eb8cb2509ed
-
Filesize
228KB
MD5f3ea7300646be02226937c58b54c1066
SHA1598ec5175805c9dea91c3d16b8c58e0e3c8da8bd
SHA2565ee392621500f6a1994f0debca2c7ef64afce568006070aa273566a100db54fb
SHA512f103f4d3d434f7a13b043225b35e75bda7983c8cc40880278460e13c8da074f72b67de174896d6a3f2aa20fcd62c1589eb3b226278620b1239c052bb48a43290
-
Filesize
228KB
MD592fb39dd5115d495bf378c75a69be5c6
SHA1772089b8044668c26eacc85d467efb98b6aeadc2
SHA256f5444c317b76f70cf3ef241300928ab7f9b4c178ae082eb405127fb830297150
SHA512958eab2517e3e94540860cfe3a3ff60c5a403e52bea5da6c9323ceced7d44a7b0b523a7a41ce01792424a94bc58a734c6b0d49084fd0979b03af9fa21e3fce0e
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84